{"title":"Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database","authors":"Tae-Youn Won, J. Chun, Dong Hoon Lee","doi":"10.1109/EUC.2008.54","DOIUrl":null,"url":null,"abstract":"RFID tag search is to find a particular tag in a group of tags by using a portable reader. Since a portable reader has own identifier and secret values associated with each tag, the portable reader can wirelessly communicate with the tag without help of central database. The RFID tag search can be useful to find a lost book among all RFID-tagged books in a library. However, the basic operation for RFID tag search has security and privacy problems. Secure search protocols to solve these problems were firstly discussed by Tan et al. Nonetheless, their protocols donpsilat perfectly solve an illegal tag tracking problem by a reuse attack of a search query and also have an illegal reader tracking problem by revealing the portable reader ID over an insecure channel. In this paper, we propose strong authentication protocol for secure RFID tag search without help of central database which utilizes a block cipher (AES-128) and a timestamp. Our protocol can search a particular tag efficiently, and preserve user privacy against all major attacks.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"38","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EUC.2008.54","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 38
Abstract
RFID tag search is to find a particular tag in a group of tags by using a portable reader. Since a portable reader has own identifier and secret values associated with each tag, the portable reader can wirelessly communicate with the tag without help of central database. The RFID tag search can be useful to find a lost book among all RFID-tagged books in a library. However, the basic operation for RFID tag search has security and privacy problems. Secure search protocols to solve these problems were firstly discussed by Tan et al. Nonetheless, their protocols donpsilat perfectly solve an illegal tag tracking problem by a reuse attack of a search query and also have an illegal reader tracking problem by revealing the portable reader ID over an insecure channel. In this paper, we propose strong authentication protocol for secure RFID tag search without help of central database which utilizes a block cipher (AES-128) and a timestamp. Our protocol can search a particular tag efficiently, and preserve user privacy against all major attacks.