Professional Documents
Culture Documents
is rarely studied by researchers[3, 4]. We are motivated by this Session Key. ID READER TAG
•
Session Key
issue. 10
•
We consider that the RFID system has four components within
an RFID system:
Figure 2. A typical security protocol in RFID system
• The RFID tag, or transponder, carries
object-identifying data.
• The RFID reader, or transceiver, reads and writes tag
data. 2. Proposed Security Protocol
• The RFID channel through which the reader and tags
communicate. In order to reduce the load of back-end database server, we
• The back-end database holds meta information of propose a security protocol that based on the dynamic key
each tag. generating function and the minimized message
1 This work was supported by the IT R&D program ofMKE/IITA, Rep. of Korea
[2008-S-023-01, Development ofNanoQplus-Based Sensor Network Simulator].
Ii Identification of tag i
'I
STi S-box for tag i
SKTi Secret key for tag i Secure connection RF connec~lon
Otherwise, the reader makes a request for the new MK. The
I F(Sbox[a],Sbox[bJ) I MK update procedure is performed as follows:
DB ~ R: Req.newMK
DB -7 R: ids2jjM~
and the reader sends it to the tag. The tag replies to the reader
as the acknowledgement.
Figure 2. An overview of cryptography logic in RFID reader
R -7 T: Er2(ids2//a2//b2//r3//EsK,(idr)//coJ
Figure 2 illustrates the procedure of creating a dynamic
R ~ T: Er3+e(F(ids2,a1//b1//r3))
composition key to encrypt/decrypt message data between a
reader and a tag. First, Sbox[n] is created with F(MK, n) and
10 - -\ - - - ,. - - r - -
8
1
8 ---:---~---~---:---~---~---I --~---~
7 - - _: - - - ~- - - ~- - _:_ - - ~- - - 1 - - -:- - - ~ - - - ~
jg 1 1 I I 1 1 1 I
'0 6 ~ - ~ - - - ~ - - -: - - - :- - - +- - -:- - - -: - - - ~
! I 1 1 1 1 1 I 1 I
~ 5 - - -: - - - ~ - - - ~ - - 1- - - ~ - - - ~ - - -:- - - ~ - - - ~
I 4 ~ - _: ~ ~ - ~ - - - I - - -: - - - ~ - - - ~ - - -:- - - -: - - - ~
'3 1 I I I 1 I 1 1 1
~ 3 ---:--- I---~---:---~---t---:----:---~
~ 1 I I I I 1 1 I 1
Q) 2 - - - - -t - - - t- - - ~ I- - ~ -j - - - +- - - 1- - - -j - - - --j
£
·---r-+---+·_·--r--:---+·_·_·-r---:---~
I 1 1 1 I 1 1 1 I
1
1 1 1 I 1 1 I 1 I
0'-----'----------'--------'-----'---------'-----'-----'-------'-----'
1 4 5 6 7 10
the number of reading RFID tags
REFERENCES
[1] Ari Juels, "RFID Security and Privacy: A Research Survey," IEEE
Journal on selected areas in communications, vol. 24, no. 2, February
2006, pp. 381·394.
[2] Zongwei Luo, Terry Chan and Jenny S. Li, "A Lightweight Mutual
Authentication Protocol for RFID Networks," Proceedings of the 2005
IEEE International Conference on e-Business Engineering (lCEBE'05).
[3] Hyun-Seok Kim and Jin-Young Choi, "The Design and Verification of
RFID Authentication Protocol for Ubiquitous Computing," Proceedings
of the 18th International Workshop on Database and Export Systems
Applications, pp. 693-697.
[4] Tom Ahlkvist Scharfeld, "An Analysis ofthe Fundamental Constraints on
Low Cost Passive Radio-Frequency Identification System Design," the
thesis for the Degree of Master of Science, Massachusetts Institute of
Technology, August 21,2001.