Strong authentication protocol for secure RFID tag search without help of central database

Tae Youn Won, Ji Young Chun, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Citations (Scopus)

Abstract

RFID tag search is to find a particular tag in a group of tags by using a portable reader. Since a portable reader has own identifier and secret values associated with each tag, the portable reader can wirelessly communicate with the tag without help of central database. The RFID tag search can be useful to find a lost book among all RFID-tagged books in a library. However, the basic operation for RFID tag search has security and privacy problems. Secure search protocols to solve these problems were firstly discussed by Tan et al. Nonetheless, their protocols don't perfectly solve an illegal tag tracking problem by a reuse attack of a search query and also have an illegal reader tracking problem by revealing the portable reader ID over an insecure channel. In this paper, we propose strong authentication protocol for secure RFID tag search without help of central database which utilizes a block cipher (AES-128) and a timestamp. Our protocol can search a particular tag efficiently, and preserve user privacy against all major attacks.

Original languageEnglish
Title of host publicationProceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Pages153-158
Number of pages6
Volume2
DOIs
Publication statusPublished - 2008 Dec 1
Event5th International Conference on Embedded and Ubiquitous Computing, EUC 2008 - Shanghai, China
Duration: 2008 Dec 172008 Dec 20

Other

Other5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
CountryChina
CityShanghai
Period08/12/1708/12/20

Fingerprint

Radio frequency identification (RFID)
Authentication
privacy
Values
Group

Keywords

  • Authentication
  • Privacy
  • RFID
  • Security
  • Serverless
  • Tag Search

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Communication

Cite this

Won, T. Y., Chun, J. Y., & Lee, D. H. (2008). Strong authentication protocol for secure RFID tag search without help of central database. In Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008 (Vol. 2, pp. 153-158). [4755222] https://doi.org/10.1109/EUC.2008.54

Strong authentication protocol for secure RFID tag search without help of central database. / Won, Tae Youn; Chun, Ji Young; Lee, Dong Hoon.

Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. Vol. 2 2008. p. 153-158 4755222.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Won, TY, Chun, JY & Lee, DH 2008, Strong authentication protocol for secure RFID tag search without help of central database. in Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. vol. 2, 4755222, pp. 153-158, 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008, Shanghai, China, 08/12/17. https://doi.org/10.1109/EUC.2008.54
Won TY, Chun JY, Lee DH. Strong authentication protocol for secure RFID tag search without help of central database. In Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. Vol. 2. 2008. p. 153-158. 4755222 https://doi.org/10.1109/EUC.2008.54
Won, Tae Youn ; Chun, Ji Young ; Lee, Dong Hoon. / Strong authentication protocol for secure RFID tag search without help of central database. Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. Vol. 2 2008. pp. 153-158
@inproceedings{d0183ceb7fb4498d96d2e0497d810eff,
title = "Strong authentication protocol for secure RFID tag search without help of central database",
abstract = "RFID tag search is to find a particular tag in a group of tags by using a portable reader. Since a portable reader has own identifier and secret values associated with each tag, the portable reader can wirelessly communicate with the tag without help of central database. The RFID tag search can be useful to find a lost book among all RFID-tagged books in a library. However, the basic operation for RFID tag search has security and privacy problems. Secure search protocols to solve these problems were firstly discussed by Tan et al. Nonetheless, their protocols don't perfectly solve an illegal tag tracking problem by a reuse attack of a search query and also have an illegal reader tracking problem by revealing the portable reader ID over an insecure channel. In this paper, we propose strong authentication protocol for secure RFID tag search without help of central database which utilizes a block cipher (AES-128) and a timestamp. Our protocol can search a particular tag efficiently, and preserve user privacy against all major attacks.",
keywords = "Authentication, Privacy, RFID, Security, Serverless, Tag Search",
author = "Won, {Tae Youn} and Chun, {Ji Young} and Lee, {Dong Hoon}",
year = "2008",
month = "12",
day = "1",
doi = "10.1109/EUC.2008.54",
language = "English",
isbn = "9780769534923",
volume = "2",
pages = "153--158",
booktitle = "Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008",

}

TY - GEN

T1 - Strong authentication protocol for secure RFID tag search without help of central database

AU - Won, Tae Youn

AU - Chun, Ji Young

AU - Lee, Dong Hoon

PY - 2008/12/1

Y1 - 2008/12/1

N2 - RFID tag search is to find a particular tag in a group of tags by using a portable reader. Since a portable reader has own identifier and secret values associated with each tag, the portable reader can wirelessly communicate with the tag without help of central database. The RFID tag search can be useful to find a lost book among all RFID-tagged books in a library. However, the basic operation for RFID tag search has security and privacy problems. Secure search protocols to solve these problems were firstly discussed by Tan et al. Nonetheless, their protocols don't perfectly solve an illegal tag tracking problem by a reuse attack of a search query and also have an illegal reader tracking problem by revealing the portable reader ID over an insecure channel. In this paper, we propose strong authentication protocol for secure RFID tag search without help of central database which utilizes a block cipher (AES-128) and a timestamp. Our protocol can search a particular tag efficiently, and preserve user privacy against all major attacks.

AB - RFID tag search is to find a particular tag in a group of tags by using a portable reader. Since a portable reader has own identifier and secret values associated with each tag, the portable reader can wirelessly communicate with the tag without help of central database. The RFID tag search can be useful to find a lost book among all RFID-tagged books in a library. However, the basic operation for RFID tag search has security and privacy problems. Secure search protocols to solve these problems were firstly discussed by Tan et al. Nonetheless, their protocols don't perfectly solve an illegal tag tracking problem by a reuse attack of a search query and also have an illegal reader tracking problem by revealing the portable reader ID over an insecure channel. In this paper, we propose strong authentication protocol for secure RFID tag search without help of central database which utilizes a block cipher (AES-128) and a timestamp. Our protocol can search a particular tag efficiently, and preserve user privacy against all major attacks.

KW - Authentication

KW - Privacy

KW - RFID

KW - Security

KW - Serverless

KW - Tag Search

UR - http://www.scopus.com/inward/record.url?scp=63149152263&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=63149152263&partnerID=8YFLogxK

U2 - 10.1109/EUC.2008.54

DO - 10.1109/EUC.2008.54

M3 - Conference contribution

AN - SCOPUS:63149152263

SN - 9780769534923

VL - 2

SP - 153

EP - 158

BT - Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008

ER -