Efficient authentication for low-cost RFID systems

Su Mi Lee, Young Ju Hwang, Dong Hoon Lee, Jong In Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

146 Citations (Scopus)

Abstract

RFID (Radio Frequency Identification) technology is expected to play a critical role in identifying articles and serving the growing need to combat counterfeiting and fraud. However, the use of RFID tags may cause privacy violation of people holding an RFID tag. The main privacy concerns are information leakage of a tag, traceabiltiy of the person and impersonation of a tag. In this paper, we study authentication as a method to protect privacy, especially for low-cost RFID systems, which have much restrictions in limited computing power, low die-size, and low power requirements. Therefore, cost effective means of authentication is needed to deal with these problems effectively. We propose an authentication protocol, LCAP, which needs only two one-way hash function operations and hence is quite efficient. Leakage of information is prevented in the scheme since a tag emits its identifier only after authentication. By refreshing a identifier of a tag in each session, the scheme also provides a location privacy and can recover lost massages from many attacks such as spoofing attacks.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science
EditorsO. Gervasi, M.L. Gavrilova, V. Kumar, A. Lagana, H.P. Lee, Y. Mun, D. Taniar, C.J.K. Tan
Pages619-627
Number of pages9
Volume3480
EditionI
Publication statusPublished - 2005
EventInternational Conference on Computational Science and Its Applications - ICCSA 2005 - , Singapore
Duration: 2005 May 92005 May 12

Other

OtherInternational Conference on Computational Science and Its Applications - ICCSA 2005
CountrySingapore
Period05/5/905/5/12

Fingerprint

Radio frequency identification (RFID)
Authentication
Costs
Hash functions

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Cite this

Lee, S. M., Hwang, Y. J., Lee, D. H., & Lim, J. I. (2005). Efficient authentication for low-cost RFID systems. In O. Gervasi, M. L. Gavrilova, V. Kumar, A. Lagana, H. P. Lee, Y. Mun, D. Taniar, ... C. J. K. Tan (Eds.), Lecture Notes in Computer Science (I ed., Vol. 3480, pp. 619-627)

Efficient authentication for low-cost RFID systems. / Lee, Su Mi; Hwang, Young Ju; Lee, Dong Hoon; Lim, Jong In.

Lecture Notes in Computer Science. ed. / O. Gervasi; M.L. Gavrilova; V. Kumar; A. Lagana; H.P. Lee; Y. Mun; D. Taniar; C.J.K. Tan. Vol. 3480 I. ed. 2005. p. 619-627.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, SM, Hwang, YJ, Lee, DH & Lim, JI 2005, Efficient authentication for low-cost RFID systems. in O Gervasi, ML Gavrilova, V Kumar, A Lagana, HP Lee, Y Mun, D Taniar & CJK Tan (eds), Lecture Notes in Computer Science. I edn, vol. 3480, pp. 619-627, International Conference on Computational Science and Its Applications - ICCSA 2005, Singapore, 05/5/9.
Lee SM, Hwang YJ, Lee DH, Lim JI. Efficient authentication for low-cost RFID systems. In Gervasi O, Gavrilova ML, Kumar V, Lagana A, Lee HP, Mun Y, Taniar D, Tan CJK, editors, Lecture Notes in Computer Science. I ed. Vol. 3480. 2005. p. 619-627
Lee, Su Mi ; Hwang, Young Ju ; Lee, Dong Hoon ; Lim, Jong In. / Efficient authentication for low-cost RFID systems. Lecture Notes in Computer Science. editor / O. Gervasi ; M.L. Gavrilova ; V. Kumar ; A. Lagana ; H.P. Lee ; Y. Mun ; D. Taniar ; C.J.K. Tan. Vol. 3480 I. ed. 2005. pp. 619-627
@inproceedings{95f2999b21bf4eca94e7268b08661268,
title = "Efficient authentication for low-cost RFID systems",
abstract = "RFID (Radio Frequency Identification) technology is expected to play a critical role in identifying articles and serving the growing need to combat counterfeiting and fraud. However, the use of RFID tags may cause privacy violation of people holding an RFID tag. The main privacy concerns are information leakage of a tag, traceabiltiy of the person and impersonation of a tag. In this paper, we study authentication as a method to protect privacy, especially for low-cost RFID systems, which have much restrictions in limited computing power, low die-size, and low power requirements. Therefore, cost effective means of authentication is needed to deal with these problems effectively. We propose an authentication protocol, LCAP, which needs only two one-way hash function operations and hence is quite efficient. Leakage of information is prevented in the scheme since a tag emits its identifier only after authentication. By refreshing a identifier of a tag in each session, the scheme also provides a location privacy and can recover lost massages from many attacks such as spoofing attacks.",
author = "Lee, {Su Mi} and Hwang, {Young Ju} and Lee, {Dong Hoon} and Lim, {Jong In}",
year = "2005",
language = "English",
volume = "3480",
pages = "619--627",
editor = "O. Gervasi and M.L. Gavrilova and V. Kumar and A. Lagana and H.P. Lee and Y. Mun and D. Taniar and C.J.K. Tan",
booktitle = "Lecture Notes in Computer Science",
edition = "I",

}

TY - GEN

T1 - Efficient authentication for low-cost RFID systems

AU - Lee, Su Mi

AU - Hwang, Young Ju

AU - Lee, Dong Hoon

AU - Lim, Jong In

PY - 2005

Y1 - 2005

N2 - RFID (Radio Frequency Identification) technology is expected to play a critical role in identifying articles and serving the growing need to combat counterfeiting and fraud. However, the use of RFID tags may cause privacy violation of people holding an RFID tag. The main privacy concerns are information leakage of a tag, traceabiltiy of the person and impersonation of a tag. In this paper, we study authentication as a method to protect privacy, especially for low-cost RFID systems, which have much restrictions in limited computing power, low die-size, and low power requirements. Therefore, cost effective means of authentication is needed to deal with these problems effectively. We propose an authentication protocol, LCAP, which needs only two one-way hash function operations and hence is quite efficient. Leakage of information is prevented in the scheme since a tag emits its identifier only after authentication. By refreshing a identifier of a tag in each session, the scheme also provides a location privacy and can recover lost massages from many attacks such as spoofing attacks.

AB - RFID (Radio Frequency Identification) technology is expected to play a critical role in identifying articles and serving the growing need to combat counterfeiting and fraud. However, the use of RFID tags may cause privacy violation of people holding an RFID tag. The main privacy concerns are information leakage of a tag, traceabiltiy of the person and impersonation of a tag. In this paper, we study authentication as a method to protect privacy, especially for low-cost RFID systems, which have much restrictions in limited computing power, low die-size, and low power requirements. Therefore, cost effective means of authentication is needed to deal with these problems effectively. We propose an authentication protocol, LCAP, which needs only two one-way hash function operations and hence is quite efficient. Leakage of information is prevented in the scheme since a tag emits its identifier only after authentication. By refreshing a identifier of a tag in each session, the scheme also provides a location privacy and can recover lost massages from many attacks such as spoofing attacks.

UR - http://www.scopus.com/inward/record.url?scp=24944582157&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=24944582157&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:24944582157

VL - 3480

SP - 619

EP - 627

BT - Lecture Notes in Computer Science

A2 - Gervasi, O.

A2 - Gavrilova, M.L.

A2 - Kumar, V.

A2 - Lagana, A.

A2 - Lee, H.P.

A2 - Mun, Y.

A2 - Taniar, D.

A2 - Tan, C.J.K.

ER -