TY - JOUR
T1 - Efficient authentication for low-cost RFID systems
AU - Lee, Su Mi
AU - Hwang, Young Ju
AU - Lee, Dong Hoon
AU - Lim, Jong In
PY - 2005
Y1 - 2005
N2 - RFID (Radio Frequency Identification) technology is expected to play a critical role in identifying articles and serving the growing need to combat counterfeiting and fraud. However, the use of RFID tags may cause privacy violation of people holding an RFID tag. The main privacy concerns are information leakage of a tag, traceabiltiy of the person and impersonation of a tag. In this paper, we study authentication as a method to protect privacy, especially for low-cost RFID systems, which have much restrictions in limited computing power, low die-size, and low power requirements. Therefore, cost effective means of authentication is needed to deal with these problems effectively. We propose an authentication protocol, LCAP, which needs only two one-way hash function operations and hence is quite efficient. Leakage of information is prevented in the scheme since a tag emits its identifier only after authentication. By refreshing a identifier of a tag in each session, the scheme also provides a location privacy and can recover lost massages from many attacks such as spoofing attacks.
AB - RFID (Radio Frequency Identification) technology is expected to play a critical role in identifying articles and serving the growing need to combat counterfeiting and fraud. However, the use of RFID tags may cause privacy violation of people holding an RFID tag. The main privacy concerns are information leakage of a tag, traceabiltiy of the person and impersonation of a tag. In this paper, we study authentication as a method to protect privacy, especially for low-cost RFID systems, which have much restrictions in limited computing power, low die-size, and low power requirements. Therefore, cost effective means of authentication is needed to deal with these problems effectively. We propose an authentication protocol, LCAP, which needs only two one-way hash function operations and hence is quite efficient. Leakage of information is prevented in the scheme since a tag emits its identifier only after authentication. By refreshing a identifier of a tag in each session, the scheme also provides a location privacy and can recover lost massages from many attacks such as spoofing attacks.
UR - http://www.scopus.com/inward/record.url?scp=24944582157&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=24944582157&partnerID=8YFLogxK
U2 - 10.1007/11424758_65
DO - 10.1007/11424758_65
M3 - Conference article
AN - SCOPUS:24944582157
SN - 0302-9743
VL - 3480
SP - 619
EP - 627
JO - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
JF - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
IS - I
T2 - International Conference on Computational Science and Its Applications - ICCSA 2005
Y2 - 9 May 2005 through 12 May 2005
ER -