Abstract
Despite various solutions to the security problems in an RFID system, most are unable to fully support all the security requirements. Plus, when designing a viable RFID system, account should also be taken of the computational load on the back-end database and restricted capacity of a tag. Accordingly, an efficient RFID protocol is proposed to reduce the computational load on both the back-end database and the tags, while also guaranteeing most security requirements for RFID wireless communication, including untraceability, authentication, and robustness against replay and spoofing attacks. Plus, in the case of desynchronization resulting from communication failure or malicious attack, the proposed scheme can recover synchronization between the database and the tag.
Keywords
This research was supported by the MIC of Korea, under the ITRC support program supervised by the IITA(IITA-2006-C1090-0603-0026).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Auto-ID Center. Draft Protocol Specification for a Class 0 Radio Frequency Identification Tag (February 2003)
Dimitriou, T.: lightweight RFID protocol to protect against traceability and cloning attacks. Security and Privacy for Emerging Areas in Communications Networks-2005. In: SecureComm 2005, Sept. 2005, pp. 59–66 (2005)
Henrici, D., Müller, P.: Hash-based Enhancement of Loaction Privacy for Radio Frequency Identification Devices using Varing Identifiers. In: Proceeding of the Second IEEE Annual Conference on Pervasive Computing and Communiations Workshops, pp. 149–162. IEEE Computer Society Press, Los Alamitos (2004)
Juels, A.: RFID Security and Privacy: A Research Survey. RSA Laboratories (2005)
Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for consumer Privacy. In: Proceeding of 10th ACM Conference on Computer and Communications Security’03, pp. 103–111. ACM Press, New York (2003)
Lee, S., Asano, T., Kim, K.: RFID Mutual Authentication Scheme based on Synchronized Secret Information. In: Proceedings of the SCIS’06 (2006)
Lee, S., et al.: Efficient Authentication for Low-cost RFID Systems. In: Gervasi, O., et al. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 619–627. Springer, Heidelberg (2005)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. In: Proceedings of the SCIS’04, pp. 719–724 (2004)
Rhee, K., et al.: Challenge-Response Based on RFID Authentication Protocol for Distributed Database Envirionment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, Springer, Heidelberg (2005)
Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-Frequency Identification: Security Risks and Challenges. RSA Laboratories, vol. 6, no. 1 (2003)
Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices. MS Thesis, MIT (2003)
Weis, S.A., et al.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., et al. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Ha, J., Ha, J., Moon, S., Boyd, C. (2007). LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System. In: Stajano, F., Kim, H.J., Chae, JS., Kim, SD. (eds) Ubiquitous Convergence Technology. ICUCT 2006. Lecture Notes in Computer Science, vol 4412. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71789-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-71789-8_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71788-1
Online ISBN: 978-3-540-71789-8
eBook Packages: Computer ScienceComputer Science (R0)