1st International ICST Workshop on Secure and Multimodal Pervasive Enviroments

Research Article

A study on secure RFID authentication protocol in insecure communication

  • @INPROCEEDINGS{10.1109/SECCOM.2007.4550320,
        author={Jang-Su Park and Soo-Young Kang and Im-Yeong Lee},
        title={A study on secure RFID authentication protocol in insecure communication},
        proceedings={1st International ICST Workshop on Secure and Multimodal Pervasive Enviroments},
        publisher={IEEE},
        proceedings_a={SMPE},
        year={2008},
        month={6},
        keywords={RFID Authentication},
        doi={10.1109/SECCOM.2007.4550320}
    }
    
  • Jang-Su Park
    Soo-Young Kang
    Im-Yeong Lee
    Year: 2008
    A study on secure RFID authentication protocol in insecure communication
    SMPE
    IEEE
    DOI: 10.1109/SECCOM.2007.4550320
Jang-Su Park1,*, Soo-Young Kang1,*, Im-Yeong Lee1,*
  • 1: Division of Computer, Soonchunhyang University, #646, Eupnae-ri, Shinchang-myun, Asan-si, chungchungnam-Do, 336-745, KOREA
*Contact email: pjswise@sch.ac.kr, bbang814@sch.ac.kr, imylee@sch.ac.kr

Abstract

RFID, a core technology that can be used to create a ubiquitous society, is a non-contact recognition system in which a small chip attached to various types of a product transmits and processes information regarding the product and the surrounding environment via wireless frequency. As a wireless recognition technology, RFID consumes little power, is small, and allows one to communicate in virtually any environment. It is thus expected to offer much convenience. Due to these characteristics of the RFID system, however, it may also pose a serious threat to privacy. A number of studies are currently being conducted to address this problem. Most of these studies use secure communication channels between a database and a reader, and insecure communication channels between a reader and a tag. This paper, however, proposes a secure authentication protocol to provide information to an authorized entity by applying the recognition technology in the insecure communication channel even for the communication between the database and the reader.