Cover
Vol. 13 No. 1 (2017)

Published: July 31, 2017

Pages: 83-103

Original Article

Design and Implementation of RFID Active Tags and Mutual Authentication Protocol with Ownership Transfer Stage

Abstract

Radio frequency identification (RFID) technology is being used widely in the last few years. Its applications classifies into auto identification and data capturing issues. The purpose of this paper is to design and implement RFID active tags and reader using microcontroller ATmega328 and 433 MHz RF links. The paper also includes a proposed mutual authentication protocol between RFID reader and active tags with ownership transfer stage. Our protocol is a mutual authentication protocol with tag’s identifier updating mechanism. The updating mechanism has the purpose of providing forward security which is important in any authentication protocol to prevent the attackers from tracking the past transactions of the compromised tags. The proposed protocol gives the privacy and security against all famous attacks that RFID system subjected for due to the transfer of data through unsecure wireless channel, such as replay, denial of service, tracking and cloning attacks. It also ensures ownership privacy when the ownership of the tag moves to a new owner.

References

  1. Landt J.: The history of RFID. pp. 8-11, October/November (2005)
  2. Kaur, M., Sandhu M., Mohan N., S. Sandhu, P.: RFID Technology Principles, Advantages, Limitations & Its Applications. International Journal of Computer and Electrical Engineering. Vol.3, No.1, pp. 151-157, February (2011)
  3. N. Nambiar, A.: RFID Technology: A Review of its Applications. Proceedings of the World Congress on Engineering and Computer Science Vol II. San Francisco, USA, 20-22 October (2009)
  4. Pateriya, R.K., Sharma, S.: The Evolution of RFID Security and Privacy: A Research Survey. International Conference on Communication Systems and Network Technologies. 115-119 (2011)
  5. Ahsan, K., Shah, H, Kingston, P.: RFID Applications: An Journal of Computer Science Issues. Vol. 7, Issue 1, No. 3, pp. 1-7, January (2010)
  6. Juels, A., L Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. Proceedings of the 10th ACM conference on Computer and communications security. New York, USA, 103-111 (2003)
  7. Juels, A.: RFID Security and Privacy: A Research Survey. NO. 2, pp. 381-394, February (2006)
  8. A. Weis, S., E. Sarma, S., L. Rivest, R., W. Engels, D.: Security and Privacy Aspects of Low-Cost Radio Frequency Systems. First Conference. Boppard, Germany, pp. 201-212, 12-14 March (2003)
  9. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to “Privacy-Friendly” Tags. RFID Privacy Workshop. MIT. MA. USA (2003)
  10. Molnar, D., Wagner, D.: Privacy and Security in Library RFID Issues, Practices, and Architectures. Proceedings of the 11th ACM conference on Computer and Communications Security. Washington DC, USA, 210-219 (2004)
  11. Dimitriou, T.: A Lightweight RFID Protocol to protect against Traceability and Cloning attacks. Proceeding of the First International Conference on Security and Privacy for Emerging Areas Communications Networks (SECURECOMM'05). 59-66 (2005)
  12. Juels, A., A. Weis, S.: Authenticating Pervasive Devices with Human Protocols. Victor Shoup, editor, Advances in Cryptology – CRYPTO’05, volume 3126 of LNCS, California, USA, 293-308 (2005)
  13. Juels A., A. Weis, S.: Defining Strong Privacy for RFID. Proceedings of Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW ’07). New York, USA, 342-347 (2007)
  14. Lee, K.: A Two-Step Mutual Authentication Protocol Based on Randomized Hash-Lock for Small RFID Networks. International Conference on Data and Knowledge Engineering (ICDKE). Melbourne, Australia,1-3 September (2010)
  15. Gui, YQ., Zhang, J.: A New Authentication RFID Protocol with Ownership Transfer. International Conference on ICT Convergence (ICTC). Jeju, South Korea, 359-364 (2013)
  16. Edelev, S., Taheri S., Hogrefe, D.: A Secure Minimalist RFID Authentication and an Ownership Transfer Protocol Compliant to EPC C1G2. IEEE International Conference on RFID Technology and Applications (RFID-TA). 126-133 (2015)
  17. Tuyls, P., Batina, L.: RFID-Tags for Anti-Counterfeiting. D. Pointcheval, editor, Topics in Cryptology-CT-RSA, vol. 3860, LNCS Springer, Verlag, 115-131 (2006)
  18. Bringer, J., Chabannel, H., Icart, T.: Cryptanalysis of ECRAC, a RFID Identification Protocol. Proceedings of the - CANS’08. Hong Kong, China, LNCS, Springer-Verlag. 149161 (2008)
  19. Deursen, T., Radomirovi´c, S.: Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC. Cryptology ePrint Archive: Report 2009/332 (2009)
  20. Lee, Y., Batina, L., Verbauwhede, I.: Untraceable RFID Authentication Protocols: Revision of EC-RAC. Proceedings of 185 (2009)
  21. Kavun, E., Yalcin, T.: A lightweight implementation of Keccak hash function for radio-frequency identification applications. Radio frequency identification: security and privacy issues. vol. 6370, Springer Berlin/Heidelberg, 258–269 (2010)
  22. Aumasson, J-P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: a lightweight hash. Cryptographic hardware and embedded systems. CHES 2010, vol. 6225, Springer Berlin/Heidelberg, 1–15 (2010)
  23. Osaka K., Takagi, T., Yamazaki, K., Takahashi, O.: An Efficient and Secure RFID Security Method with Ownership Transfer. Computational Intelligence and Security, Vol. 2, 1090-1095 (2006)
  24. Lei, H., Cao, T.: RFID Protocol enabling Ownership Transfer to protect against Traceability and DoS attacks. First pp. 508-510, Nov (2007)
  25. Kulseng, L., Yu, Z., Wei, Y., Guan, Y.: Lightweight Mutual Authentication and Ownership Transfer for RFID Systems. IEEE INFOCOM . pp. 1–5, Mar (2010)
  26. Song, B., J. Mitchell, Chris.: Scalable RFID security protocols supporting tag ownership transfer. Computer Communications 34. 556–566 (2011)
  27. Miyaji, A., S. Rahman, M., Soshi, M.: Efficient and LowCost RFID Authentication Schemes. Journal of Wireless Mobile Networks. Ubiquitous Computing, and Dependable Applications (JoWUA), 2(3), pp. 4-25, Sep (2011)
  28. Chen , CL., Huang, YC., R. Jiang, J.: A Secure Ownership Transfer Protocol Using EPCglobal RFID. Telecommunication Systems 53(4), 387-399 (2013)