An efficient and secure RFID security method with ownership transfer

Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

35 Citations (Scopus)

Abstract

Radio Frequency Identification (RFID) has come under the spotlight as technology supporting ubiquitous society. But now, we face several security problems and challenges in RFID systems. Recent papers have reported that RFID systems have to achieve the following requirements: (1) Indistinguishability, (2) Forward Security, (3) Replay Attack resistance, (4) Tag Killing resistance, and (5) Ownership Transferability. We have to design RFID system that achieves the above-mentioned requirements. The previous security methods achieve only some of them individually, and no RFID system has been constructed that achieves all requirements. In this paper, we propose an RFID security method that achieves all requirements based on a hash function and a symmetric key cryptosystem. In addition, our proposed method provides not only high-security but also high-efficiency.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages778-787
Number of pages10
Volume4456 LNAI
Publication statusPublished - 2007
Externally publishedYes
EventInternational Conference on Computational Intelligence and Security, CIS 2006 - Guangzhou
Duration: 2006 Nov 32006 Nov 6

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4456 LNAI
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherInternational Conference on Computational Intelligence and Security, CIS 2006
CityGuangzhou
Period06/11/306/11/6

Fingerprint

Radio frequency identification (RFID)
Hash functions
Cryptography

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Osaka, K., Takagi, T., Yamazaki, K., & Takahashi, O. (2007). An efficient and secure RFID security method with ownership transfer. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4456 LNAI, pp. 778-787). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4456 LNAI).

An efficient and secure RFID security method with ownership transfer. / Osaka, Kyosuke; Takagi, Tsuyoshi; Yamazaki, Kenichi; Takahashi, Osamu.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4456 LNAI 2007. p. 778-787 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4456 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Osaka, K, Takagi, T, Yamazaki, K & Takahashi, O 2007, An efficient and secure RFID security method with ownership transfer. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 4456 LNAI, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4456 LNAI, pp. 778-787, International Conference on Computational Intelligence and Security, CIS 2006, Guangzhou, 06/11/3.
Osaka K, Takagi T, Yamazaki K, Takahashi O. An efficient and secure RFID security method with ownership transfer. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4456 LNAI. 2007. p. 778-787. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Osaka, Kyosuke ; Takagi, Tsuyoshi ; Yamazaki, Kenichi ; Takahashi, Osamu. / An efficient and secure RFID security method with ownership transfer. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4456 LNAI 2007. pp. 778-787 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{2411537e477c463b914ab0cc020d9d94,
title = "An efficient and secure RFID security method with ownership transfer",
abstract = "Radio Frequency Identification (RFID) has come under the spotlight as technology supporting ubiquitous society. But now, we face several security problems and challenges in RFID systems. Recent papers have reported that RFID systems have to achieve the following requirements: (1) Indistinguishability, (2) Forward Security, (3) Replay Attack resistance, (4) Tag Killing resistance, and (5) Ownership Transferability. We have to design RFID system that achieves the above-mentioned requirements. The previous security methods achieve only some of them individually, and no RFID system has been constructed that achieves all requirements. In this paper, we propose an RFID security method that achieves all requirements based on a hash function and a symmetric key cryptosystem. In addition, our proposed method provides not only high-security but also high-efficiency.",
author = "Kyosuke Osaka and Tsuyoshi Takagi and Kenichi Yamazaki and Osamu Takahashi",
year = "2007",
language = "English",
isbn = "9783540743767",
volume = "4456 LNAI",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "778--787",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - An efficient and secure RFID security method with ownership transfer

AU - Osaka, Kyosuke

AU - Takagi, Tsuyoshi

AU - Yamazaki, Kenichi

AU - Takahashi, Osamu

PY - 2007

Y1 - 2007

N2 - Radio Frequency Identification (RFID) has come under the spotlight as technology supporting ubiquitous society. But now, we face several security problems and challenges in RFID systems. Recent papers have reported that RFID systems have to achieve the following requirements: (1) Indistinguishability, (2) Forward Security, (3) Replay Attack resistance, (4) Tag Killing resistance, and (5) Ownership Transferability. We have to design RFID system that achieves the above-mentioned requirements. The previous security methods achieve only some of them individually, and no RFID system has been constructed that achieves all requirements. In this paper, we propose an RFID security method that achieves all requirements based on a hash function and a symmetric key cryptosystem. In addition, our proposed method provides not only high-security but also high-efficiency.

AB - Radio Frequency Identification (RFID) has come under the spotlight as technology supporting ubiquitous society. But now, we face several security problems and challenges in RFID systems. Recent papers have reported that RFID systems have to achieve the following requirements: (1) Indistinguishability, (2) Forward Security, (3) Replay Attack resistance, (4) Tag Killing resistance, and (5) Ownership Transferability. We have to design RFID system that achieves the above-mentioned requirements. The previous security methods achieve only some of them individually, and no RFID system has been constructed that achieves all requirements. In this paper, we propose an RFID security method that achieves all requirements based on a hash function and a symmetric key cryptosystem. In addition, our proposed method provides not only high-security but also high-efficiency.

UR - http://www.scopus.com/inward/record.url?scp=38349066494&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=38349066494&partnerID=8YFLogxK

M3 - Conference contribution

SN - 9783540743767

VL - 4456 LNAI

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 778

EP - 787

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -