Research Article
A study on secure RFID authentication protocol in insecure communication
@INPROCEEDINGS{10.1109/SECCOM.2007.4550320, author={Jang-Su Park and Soo-Young Kang and Im-Yeong Lee}, title={A study on secure RFID authentication protocol in insecure communication}, proceedings={1st International ICST Workshop on Secure and Multimodal Pervasive Enviroments}, publisher={IEEE}, proceedings_a={SMPE}, year={2008}, month={6}, keywords={RFID Authentication}, doi={10.1109/SECCOM.2007.4550320} }
- Jang-Su Park
Soo-Young Kang
Im-Yeong Lee
Year: 2008
A study on secure RFID authentication protocol in insecure communication
SMPE
IEEE
DOI: 10.1109/SECCOM.2007.4550320
Abstract
RFID, a core technology that can be used to create a ubiquitous society, is a non-contact recognition system in which a small chip attached to various types of a product transmits and processes information regarding the product and the surrounding environment via wireless frequency. As a wireless recognition technology, RFID consumes little power, is small, and allows one to communicate in virtually any environment. It is thus expected to offer much convenience. Due to these characteristics of the RFID system, however, it may also pose a serious threat to privacy. A number of studies are currently being conducted to address this problem. Most of these studies use secure communication channels between a database and a reader, and insecure communication channels between a reader and a tag. This paper, however, proposes a secure authentication protocol to provide information to an authorized entity by applying the recognition technology in the insecure communication channel even for the communication between the database and the reader.