Strong authentication protocol for secure RFID tag search without help of central database

Tae Youn Won, Ji Young Chun, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Citations (Scopus)

Abstract

RFID tag search is to find a particular tag in a group of tags by using a portable reader. Since a portable reader has own identifier and secret values associated with each tag, the portable reader can wirelessly communicate with the tag without help of central database. The RFID tag search can be useful to find a lost book among all RFID-tagged books in a library. However, the basic operation for RFID tag search has security and privacy problems. Secure search protocols to solve these problems were firstly discussed by Tan et al. Nonetheless, their protocols don't perfectly solve an illegal tag tracking problem by a reuse attack of a search query and also have an illegal reader tracking problem by revealing the portable reader ID over an insecure channel. In this paper, we propose strong authentication protocol for secure RFID tag search without help of central database which utilizes a block cipher (AES-128) and a timestamp. Our protocol can search a particular tag efficiently, and preserve user privacy against all major attacks.

Original languageEnglish
Title of host publicationProceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Pages153-158
Number of pages6
DOIs
Publication statusPublished - 2008
Event5th International Conference on Embedded and Ubiquitous Computing, EUC 2008 - Shanghai, China
Duration: 2008 Dec 172008 Dec 20

Publication series

NameProceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Volume2

Other

Other5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
CountryChina
CityShanghai
Period08/12/1708/12/20

Keywords

  • Authentication
  • Privacy
  • RFID
  • Security
  • Serverless
  • Tag Search

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Communication

Fingerprint Dive into the research topics of 'Strong authentication protocol for secure RFID tag search without help of central database'. Together they form a unique fingerprint.

  • Cite this

    Won, T. Y., Chun, J. Y., & Lee, D. H. (2008). Strong authentication protocol for secure RFID tag search without help of central database. In Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008 (pp. 153-158). [4755222] (Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008; Vol. 2). https://doi.org/10.1109/EUC.2008.54