A light-weight security protocol for RFID system

Jung Hyun Oh, Hyun Seok Kim, Jin Young Choi

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)

    Abstract

    RFID is automatic object identifying technology via radio frequency. And its application areas are un-describable for its convenience and pervasiveness. However, because the communication channel between the verifier and the tag is wireless, serious privacy problems such as the data leakage and the data traceability can be occur. Without resolving these privacy problems, RFID system cannot be adapted fully in any area. Many kinds of security protocols have been proposed to resolve these problems. However, previous proposals did not satisfy security requirements and still leaved vulnerabilities. In this paper, we describe the security vulnerabilities of previous works for RFID systems. Finally, we propose a security protocol which based on one-time pad scheme using random nonce and shared secret values. The proposed protocol satisfies security requirements such as the data secrecy, data anonymity and the data authenticity between the verifier and the tag. We have proved security requirements satisfaction formally by using GNY logic.

    Original languageEnglish
    Title of host publicationPersonal Wireless Communications
    Subtitle of host publicationThe 12th IFIP International Conference on Personal Wireless Communications (PWC 2007), Prague, Czech Republic, September 2007
    EditorsRobert Bestak, Boris Simak, Ewa Kozlowska
    Pages384-395
    Number of pages12
    DOIs
    Publication statusPublished - 2007

    Publication series

    NameIFIP International Federation for Information Processing
    Volume245
    ISSN (Print)1571-5736

    Keywords

    • GNY logic
    • One-time pad
    • RFID
    • Security protocol

    ASJC Scopus subject areas

    • Information Systems and Management

    Fingerprint

    Dive into the research topics of 'A light-weight security protocol for RFID system'. Together they form a unique fingerprint.

    Cite this