STATE OF THE ART ON SECURE AND LOW COST RFID AUTHENTICATION PROTOCOLS FOR RFID BASED VEHICLE LICENSE PLATE

Publications

Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering, Engineering, Electrical & Electronic

GET ALERTS

eISSN: 1178-5608

DESCRIPTION

9
Reader(s)
15
Visit(s)
0
Comment(s)
0
Share(s)

VOLUME 6 , ISSUE 5 (December 2013) > List of articles

STATE OF THE ART ON SECURE AND LOW COST RFID AUTHENTICATION PROTOCOLS FOR RFID BASED VEHICLE LICENSE PLATE

Irfan Syamsuddin *

Keywords : RFID, vehicle plate license, smart identification, security and privacy, low cost, data protection, tracking prevention, and forward security.

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 6, Issue 5, Pages 1,949-1,969, DOI: https://doi.org/10.21307/ijssis-2017-621

License : (CC BY-NC-ND 4.0)

Received Date : 15-July-2013 / Accepted: 30-October-2013 / Published Online: 16-December-2013

ARTICLE

ABSTRACT

RFID technology has many potential applications that would ease object identification seamlessly. One of its potential benefits to government is the adoption of RFID tag as embedded smart material within vehicle license plate. However, adoption of RFID in vehicle license plate is fragile from various RFID attacks while efforts to improve its security will lead to additional cost. Enhancing RFID security without extra cost poses new challenges to researchers in the area. This study aims to provide a state of the art on RFID authentication protocols under low cost restriction as a foundation for decision maker for further development stage of RFID based vehicle license plate. In depth analysis is performed by assessing the protocols according to three features namely data protection, tracking prevention, and forward security. Finally, it is concluded that the protocols are vary in satisfying three aspects of security features.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

[1] A. Juels, “Minimalist Cryptography for RFID Tags,” in Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, Springer, Heidelberg, 2005.
[2] F.Karray, M.Alemzadeh, J. Abou Saleh and M.N.Arab, “Human-Computer Interaction: Overview on State of the Art”, International Journal On Smart Sensing And Intelligent Systems,2008, Vol. 1, No. 1, pp.137-159.
[3] D. Henrici, and P. Muller, “Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers, “ in Proceedings of Workshop on Pervasive Computing and Communications Security, 2004.
[4] D. Molnar and D. Wagner, “Privacy and Security in Library RFID Issues, Practices, and Architectures,” in ACM Conference on Computer and Communication Security, 2004.
[5] G. Avoine, P. Oechslin, “RFID Traceability: A Multilayer Problem,” Financial Cryptography, 2005.
[6] K. Rhee, J. Kwak, S. Kim, D. Won, “Challenge-response based RFID authentication protocol for distributed database environment” International Conference on Security in Pervasive Computing SPC 2005, pp. 70-84, 2005.
[7] Lamport, “Password Authentication with Insecure Communication”, Communications of the ACM vol. 24, no.11, pp 770-772, 1981.
[8] M. Ohkubo, K. Suzuki, and S. Kinoshita, “Cryptographic approach to privacy-friendly tags”, RFID Privacy Workshop, 2003.
[9] M.Langheinrich and R.Marti, “Practical Minimalist Cryptography for RFID Privacy,” IEEE Systems Journal, vol. 1, no. 2, Dec 2007.
[10] P.P.Lopez, J.C.H. Castro, J.M.E. Tapiador, and A.Ribagorda, “RFID Systems: A Survey on Security Threats and Proposed Solutions,” IFIP 2006, PWC 2006, LNCS 4217, pp. 159–170, 2006.
[11] R. Want, Enabling Ubiquitous sensing with RFID, Computer 37 (4), 2004, pp. 84-86.
[12] S. Han, T.S. Dhillon, and E. Chang, “Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database,” MSN 2007, LNCS 4864, pp. 623–632.
[13] S. Han, V. Potdar, and E. Chang, “Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor”, ICCSA 2007, LNCS 4707, pp. 227 – 238, 2007.
[14] S. Lee, H. Lee, T. Asano, and K. Kim, “Enhanced RFID Mutual Authentication Scheme based on Synchronized Secret Information”, AUTO-ID Labs White Paper, WPHARDWARE 032, 2006.
[15] S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, “Security & Privacy Aspects of Low-Cost Radio Frequency Identification Systems, ”Security in Pervasive Computing, LNCS no. 2802, pp. 201-212, 2004.
[16] S.E.Sarma, S.A.Weis, and D.W.Engels, “RFID systems, security and privacy implications,” in Technical Report MIT-AUTOID-WH-014, AutoID center, MIT, Cambridge, 2002.
[17] S.L. Garfinkel, A.Juels and R. Pappu, “RFID Privacy: An Overview of Problems and Proposed Solutions,” IEEE Security and Privacy May 2005, pp. 34-43.
[18] S.M.Lee, Y.J.Hwang, D.H.Lee, and J.I.Lim, “Efficient Authentication for Low-Cost RFID Systems, “ in International Conference on Computational Science and Its Applications, pp. 619–627, May 2005
[19] T. Dimitriou, “A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks,” in International Conference on Security and Privacy for Emerging Areas in Communication Networks, September 2005.H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4.
[20] J. Curtin, R. Kauffman, and F. Riggins, “Making the ‘MOST’ out of RFID technology: A research agenda for the study of the adoption, usage and impact of RFID,” Information Technology and Management, vol. 8, no. 2, 87–110. 2007
[21] R. Das, “RFID Tag Sales in 2005—How Many and Where,” DTechEx Ltd., 2005.
[22] C. Heinrich, RFID and Beyond, Wiley, Indianapolis, 2005.
[23] H. Knospe and H. Pohl, “RFID Security,” Information Security Technical Report, vol. 9, issue 4, pp 39-50, Dec 2004.
[24] P. Peris-Lopez, J.C.Hernandez-Castro, E.T.Juan, and R. Arturo, “LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags” Workshop on RFID Security -- RFIDSec 06, July 2006
[25] CC.Tan,, B.Sheng, and Q. Li, “Serverless Search and Authentication protocols for RFID”. In: Proceedings of Pervasive Computing Conference (2006)).
[26] P. Peris-Lopez, J.C.Hernandez-Castro, E.T.Juan, and R. Arturo,”M2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags”, Lecture Notes inComputer Science, 912--923, Springer-Verlag, Sep-2006.
[27] P. Peris-Lopez, J.C.Hernandez-Castro, E.T.Juan, and R. Arturo, “EMAP: An Efficient Mutual Authentication Protocol for Low-cost RFID Tags”, OTM Federated Conferences and Workshop: IS Workshop -- IS'06, 2006, 4277 Lecture Notes in Computer Science, P-352--361, November Springer-Verlag.
[28] S.Y.Kang and I.M.Lee, “A Study on Low-Cost RFID System Management with Mutual Authentication Scheme”, Ubiquitous, 2008 International Conference on Multimedia and Ubiquitous Engineering
[29] T.Li, G.Wang and R.H.Deng, “Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols”, Journal of Software, vol. 3, no. 3, March 2008. [30] X.Tao, H.Yang, R.Chen, and J.Du, “An Improvement on Randomly Changed Identification Protocol for Low-Cost Tags”, Advanced Materials Research 1583, 2012, pp. 562-564
[31] J.Segura, J.G.Jordán, M.A.Jaen, F.R.Soriano, and A.Soriano, “Low Cost Identification Applications in Traffic Vehicular Environments”, in Sustainable Radio Frequency Identification Solutions, 2010.
[32] M.G.Gnoni, V.Elia, and A.Rollo, “RFID technology for an intelligent public transport network management”, International Journal of RF Technologies: Research and Applications, 2010,Vol. 3, No. 1 , pp.1-13
[33] G.H Hwang, K.H.Cha, S.Bhardwaj and D.S.Lee, “UHF RFID Metal Tag Applying to License Plate Using Metal Shielding and Watertight Methods”, International Journal on Smart Sensing And Intelligent Systems, Vol. 2, No. 4, pp. 549 – 563
[34] S. Merilampi, T. Björninen, L. Sydänheimo, and L. Ukkonen, “Passive UHF RFID Strain Sensor Tag For Detecting Limb Movement”, International Journal On Smart Sensing And Intelligent Systems Vol. 5, No. 2, pp. 315 – 328
[35] I.Syamsuddin, S.Han, T.Dillon, “A survey on low-cost RFID authentication protocols”, ICACSIS 2012 International Conference on Advanced Computer Science and Information Systems, 2012, pp. 77 – 82
[36] E.G.Ahmed, E.Shaaban, M.Hashem, “Lightweight Mutual Authentication Protocol for Low Cost RFID Tags”, International Journal of Network Security & Its Applications (IJNSA), 2010, vol. 2, no. 2 , pp.27-37

EXTRA FILES

COMMENTS