Abstract
There are many researches related to privacy protection in RFID system. Among them, Ohkubo’s hash-based scheme is provably secure and it can protect user’s privacy, prevent location tracking, and guarantee forward security completely. Unfortunately, one-way hash functions, which play important roles in Ohkubo’s schem, can’t be implemented into the current RFID tag hardware. So we propose a new secure protocol for RFID privacy protection, and it is a modified version of Ohkubo’s scheme using Feldhofer’s AES module for RFID tag. Our new scheme has almost all of advantages of Ohkubo’s scheme and moreover it can be embedded into RFID tag hardware easily.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “privacy-friendly” tags. In: RFID Privacy Workshop, MIT, MA, USA (November 2003)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient hash-chain based RFID privacy protection scheme. In: International Conference on Ubiquitous Computing – Ubicomp, Workshop Privacy: Current Status and Future Directions, Nottingham, England (September 2004)
Avoine, G., Oechslin, P.: A scalable and provably secure hash based RFID protocol. In: International Workshop on Pervasive Computing and Communication Security – PerSec 2005, Kauai Island, Hawaii, USA, pp. 110–114. IEEE Computer Society Press, Los Alamitos (2005)
Avoine, G.: Adversary model for radio frequency identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland (September 2005)
Avoine, G., Oechslin, P.: RFID traceability: A multilayer problem. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125–140. Springer, Heidelberg (2005)
Yeo, S.S., Kim, S.K.: Scalable and flexible privacy protection scheme for RFID systems. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 153–163. Springer, Heidelberg (2005)
Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)
Kim, S.C., Yeo, S.S., Kim, S.K.: MARP: Mobile agent for rfid privacy protection. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 300–312. Springer, Heidelberg (2006)
Yeo, S.S., Kim, S.C., Kim, S.K.: eMARP: Enhanced mobile agent for RFID privacy protection and forgery detection. In: Nguyen, N., Grzech, A., Howlett, R., Jain, L. (eds.) First KES Symposium on Agent and Multi-Agent Systems – AMSTA 2007. LNCS, vol. 4496, pp. 318–327. Springer, Heidelberg (2007)
Feldhofer, M., Rechberger, C.: A case against currently used hash functions in RFID protocols. In: Printed handout of Workshop on RFID Security – RFIDSec 06 (July 2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yeo, SS., Sakurai, K., Cho, S., Yang, K., Kim, S.K. (2007). Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard. In: Thulasiraman, P., He, X., Xu, T.L., Denko, M.K., Thulasiram, R.K., Yang, L.T. (eds) Frontiers of High Performance Computing and Networking ISPA 2007 Workshops. ISPA 2007. Lecture Notes in Computer Science, vol 4743. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74767-3_26
Download citation
DOI: https://doi.org/10.1007/978-3-540-74767-3_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74766-6
Online ISBN: 978-3-540-74767-3
eBook Packages: Computer ScienceComputer Science (R0)