Title :
A design of e-ID authentication protocol in Gen2 environment
Author :
Choi, Yong-Sik ; Han, Soo ; Shin, Seung Ho
Author_Institution :
Dept. of Comput. Sci. & Eng., Incheon Univ., Incheon
Abstract :
In Gen2 standard basis, hash function, symmetrical algorithm and the like are not supported. As security vulnerability between vertical sections, cloning, wiretapping, middleware and service refusal attacks are possible due to absence of mutual authentication mechanism between tag-readers. Through mutual authentication mechanism between tag and reader, and multiple reader management technique, efficiency in multiple reader management is provided. Hereby, security is enhanced by effectively protecting from clone, wiretapping and middleware attack of tag, which can be used as e-id.
Keywords :
cryptographic protocols; message authentication; telecommunication network management; telecommunication security; Gen2 environment; clone protection; e-ID authentication protocol design; middleware attack; multiple reader management technique; mutual authentication mechanism; security vulnerability; service refusal attack; vertical sections; wiretapping protection; Access protocols; Authentication; Cloning; Computer crashes; Frequency conversion; Frequency division multiaccess; Information security; Interference; Middleware; Radiofrequency identification; Gen2; Hash Lock; Tag; authentication;
Conference_Titel :
Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on
Conference_Location :
Gangwon-Do
Print_ISBN :
978-89-5519-136-3
DOI :
10.1109/ICACT.2008.4493754