An authentication protocol in a security layer for RFID smart tags

被引:33
作者
Feldhofer, M [1 ]
机构
[1] Graz Univ Technol, IAIK, A-8010 Graz, Austria
来源
MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3 | 2004年
关键词
D O I
10.1109/MELCON.2004.1347041
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This article presents a novel approach of a cryptographic authentication protocol for Radio Frequency Identification (RFID) smart tags. RFID smart tags are microchips which can be attached to products in order to allow their contactless identification via radio frequency. Cryptographic authentication is necessary to provide security for products like branded goods or immobilizer systems in cars. However, existing protocols do not include cryptographic authentication mechanisms. Therefore, a new approach for authentication is presented in this paper. Due to the limited computing power, die-size, and low-power restrictions, a two-way challenge-response authentication scheme is proposed. Packet and frame formats extend the existing RFID protocol which is defined in the ISO/IEC 18000 standard [1]. The analysis of the authentication mechanism was done using Java models at different abstraction levels. The hardware implementation of the tag was realized in VHDL using a customized embedded microcontroller.
引用
收藏
页码:759 / 762
页数:4
相关论文
共 9 条
[1]  
[Anonymous], 2001, FIPS PUB
[2]  
Aydos M, 2000, 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, P401
[3]  
Finkenzeller K, 2002, RFID HDB
[4]  
*I APPL INF PROC C, IAIK JCE TOOLK
[5]  
*INT ORG STAND, 2003, 180003 ISOIEC INT OR
[6]  
Menezes A. J., 1997, CRC PRESS SERIES DIS
[7]  
MYERS JG, 1997, 2222 RFC
[8]  
*NAT I STAND TECHN, 1997, FIPS PUB, V196
[9]  
Preneel B, 1998, LECT NOTES COMPUT SC, V1528, P49