The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.08 - August (2009 vol.8)
pp: 1052-1062
Hung-Min Sun , National Tsing Hua University, Hsinchu
Wei-Chih Ting , National Tsing Hua University, Hsinchu
ABSTRACT
EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the identity of tag (TID) is transmitted in plaintext which makes the tag traceable and clonable. Several solutions have been proposed based on traditional encryption methods, such as symmetric or asymmetric ciphers, but they are not suitable for low-cost RFID tags. Recently, some lightweight authentication protocols conforming to Gen2 have been proposed. However, the message flow of these protocols is different from Gen2. Existing readers may fail to read new tags. In this paper, we propose a novel authentication protocol based on Gen2, called Gen2^{+}, for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide backward compatibility. Gen2^{+} is a multiple round protocol using shared pseudonyms and Cyclic Redundancy Check (CRC) to achieve reader-to-tag authentication. Conversely, Gen2^{+} uses the memory read command defined in Gen2 to achieve tag-to-reader authentication. We show that Gen2^{+} is more secure under tracing and cloning attacks.
INDEX TERMS
Protocol design and analysis, security, privacy.
CITATION
Hung-Min Sun, Wei-Chih Ting, "A Gen2-Based RFID Authentication Protocol for Security and Privacy", IEEE Transactions on Mobile Computing, vol.8, no. 8, pp. 1052-1062, August 2009, doi:10.1109/TMC.2008.175
REFERENCES
[1] S. Weis, “Security and Privacy in Radio-Frequency Identification Devices,” master's thesis, Mass. Inst. of Technology (MIT), May 2003.
[2] EPCglobal, Inc., http:/www.epcglobalinc.org/, 2005.
[3] A. Juels, “RFID Security and Privacy: A Research Survey,” manuscript, RSA Laboratories, Sept. 2005.
[4] S. Weis et al., “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” Proc. First Int'l Conf. Security in Pervasive Computing (SPC '03), Mar. 2003.
[5] H. Lee and J. Kim, “Privacy Threats and Issues in Mobile RFID,” Proc. First Int'l Conf. Availability, Reliability and Security (ARES '06), Apr. 2006.
[6] D. Molnar and D. Wagner, “Privacy and Security in Library RFID: Issues, Practices, and Architectures,” Proc. 11th ACM Conf. Computer and Comm. Security (CCS '04), Oct. 2004.
[7] S. Sarma, S. Weis, and D. Engels, “RFID Systems and Security and Privacy Implications,” Proc. Fourth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '02), Aug. 2002.
[8] M. Ohkubo, K. Suzuki, and S. Kinoshita, “Cryptographic Approach to ‘Privacy-Friendly’ Tags,” Proc. Radio Frequency Identification (RFID) Privacy Workshop, Nov. 2003.
[9] T. Dimitriou, “A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks,” Proc. First IEEE Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm '05), Sept. 2005.
[10] X. Gao et al., “An Approach to Security and Privacy of RFID System for Supply Chain,” Proc. IEEE Int'l Conf. E-Commerce Technology for Dynamic E-Business (CEC-East '04), Sept. 2004.
[11] C.C. Tan, B. Sheng, and Q. Li, “Severless Search and Authentication Protocols for RFID,” Proc. Fifth IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom '07), Mar. 2007.
[12] G. Tsudik, “YA-TRAP: Yet Another Trivial RFID Authentication Protocol,” Proc. Fourth IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom '06), Mar. 2006.
[13] G. Avoine and P. Oechslin, “A Scalable and Provably Secure Hash Based RFID Protocol,” Proc. Third IEEE Int'l Workshop Pervasive Computing and Comm. Security (PERCOMW '05), Mar. 2005.
[14] D. Henrici and P. Müller, “Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers,” Proc. First IEEE Int'l Workshop Pervasive Computing and Comm. Security (PerSec '04), Mar. 2004.
[15] A. Juels, R. Rivest, and M. Szydlo, “The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), Oct. 2003.
[16] M. Rieback, B. Crispo, and A. Tanenbaum, “RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management,” Proc. Australasian Conf. Information Security and Privacy (ACISP '05), July 2005.
[17] A. Juels and J. Brainard, “Soft Blocking: Flexible Blocker Tags on the Cheap,” Proc. Workshop Privacy in the Electronic Soc. (WPES '04), Oct. 2004.
[18] L. Bolotnyy and G. Robins, “Physically Unclonable Function-Based Security and Privacy in RFID Systems,” Proc. Fifth IEEE Int'l Conf. Pervasive Computing and Comm. (PERCOM '07), Mar. 2007.
[19] G. Ateniese, J. Camenisch, and B. De Medeiros, “Untraceable RFID Tags via Insubvertible Encryption,” Proc. 12th ACM Conf. Computer and Comm. Security (CCS '05), Nov. 2005.
[20] I. Kim, B. Lee, and H. Kim, “Privacy-Friendly Mobile RFID Reader Protocol Design Based on Trusted Agent and PKI,” Proc. 10th IEEE Int'l Symp. Consumer Electronics (ISCE '06), June 2006.
[21] I. Kim, B. Lee, and H. Kim, “Privacy Protection Based on User-Defined Preferences in RFID System,” Proc. Eighth Int'l Conf. Advanced Comm. Technology (ICACT '06), Feb. 2006.
[22] I. Vajda and L. Buttyán, “Lightweight Authentication Protocols for Low-Cost RFID Tags,” Proc. Second Workshop Security in Ubiquitous Computing (Ubicomp '03), Oct. 2003.
[23] A. Juels, “Strengthening EPC Tags against Cloning,” manuscript, RSA Laboratories, Mar. 2005.
[24] Y.C. Chen, W.L. Wang, and M.S. Hwang, “RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection,” Proc. Ninth IEEE Int'l Conf. Advanced Comm. Technology (ICACT '07), Feb. 2007.
[25] A. Juels, “Minimalist Cryptography for Low-Cost RFID Tags,” Proc. Fourth Int'l Conf. Security in Comm. Networks (SCN '04), Sept. 2004.
[26] Y.Z. Li et al., “Security and Privacy on Authentication Protocol for Low-Cost RFID,” Proc. Int'l Conf. Computational Intelligence and Security (CIS '06), Nov. 2006.
[27] P. Peris-Lopez et al., “M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags,” Proc. Third Int'l Conf. Ubiquitous Intelligence and Computing (UIC-06), Sept. 2006.
[28] H. Chabanne and G. Fumaroli, “Noisy Cryptographic Protocols for Low-Cost RFID Tags,” IEEE Trans. Information Theory, vol. 52, no. 8, pp. 3562-3566, Aug. 2006.
[29] H.Y. Chien, “SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity,” IEEE Trans. Dependable and Secure Computing, vol. 4, no. 4, pp. 337-340, 2007.
[30] D.H. Choi, T.S. Kim, and H.W. Kim, “Privacy Protection for Secure Mobile RFID Service,” Proc. First IEEE Int'l Symp. Wireless Pervasive Computing (ISWPC '06), Jan. 2006.
[31] A. Juels, “A Bit of Privacy,” http://www.rfidjournal.com/article/view/ 1536/182, May 2005.
[32] D.N. Duc et al., “Enhancing Security of EPCglobal Gen2 RFID Tag against Traceability and Cloning,” Proc. Third Conf. Soft Computing and Intelligent Systems (SCIS '06), Jan. 2006.
[33] H.Y. Chien and C.W. Huang, “A Lightweight RFID Protocol Using Substring,” Proc. IFIP Int'l Conf. Embedded and Ubiquitous Computing (EUC '07), Dec. 2007.
[34] H.M. Sun, W.C. Ting, and K.H. Wang, “On the Security of Chien's Ultralightweight RFID Authentication Protocol,” Cryptology ePrint Archive, http:/eprint.iacr.org/, Feb. 2008.
[35] M. Bárász et al., “Passive Attack Against the M2AP Mutual Authentication Protocol for RFID Tags,” Proc. First Int'l Workshop RFID Technology (EURASIP), Sept. 2007.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool