RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks

  • Jeonil Kang
  • DaeHun Nyang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3813)


Even if there are many authentication protocols for RFID system, only a few protocols support location privacy. Because of tag’s hardware limitation, these protocols suffer from many security threats, especially from the DoS (Denial of Service) attacks. In this paper, we discuss location privacy problem and show vulnerabilities of RFID authentication protocols. And then, we will suggest a strong authentication protocol against location tracing, spoofing attack, and DoS attack.


Authentication Protocol Request Message Database Server Location Privacy Response Message 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Henrici, D., Müller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Device using Verying Identifiers. In: Workshop on Pervasive Computing and Communications Security - PerSec 2004, University of Kaiserslautern, Germany, pp. 149–153. IEEE, Los Alamitos (2004)CrossRefGoogle Scholar
  2. 2.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to ‘Privacy-Friendly’ Tags. NTT Laboratories, Japan, RFID Privacy Workshop MIT (2003)Google Scholar
  3. 3.
    Vajda, I., Buttyán, L.: Lightweight Authentication Protocols for Low-Cost RFID tags, Budapest University of Technology and Economics, Hungary (2003)Google Scholar
  4. 4.
    Juels, A.: Minimalist Cryptography for Low-Cost RFID Tags, RSA Laboratories, USAGoogle Scholar
  5. 5.
    Juels, A.: Yoking-Proofs for RFID Tags, RSA Laboratories, USAGoogle Scholar
  6. 6.
    Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag:Selective Blocking of RFID Tag for Consumer Privacy, RSA Laboratories, USAGoogle Scholar
  7. 7.
    Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal Re-encryption for Mixnets, RSA Laboratories, USAGoogle Scholar
  8. 8.
    Engberg, S.J., Harning, M.B., Jensen, C.D.: Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience. In: Privacy, Security and Trust 2004 - PST 2004, EU Smarttag Workshop (2004)Google Scholar
  9. 9.
    Feldhofer, M.: A Propsal for an Authentication Protocol in a Security Layer for RFID Smart Tags. In: Institute for Applie Information Processing and Communications (IAIK), Graz University of Technology, AustriaGoogle Scholar
  10. 10.
    Avoine, G., Oechslim, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125–140. Springer, Heidelberg (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Jeonil Kang
    • 1
  • DaeHun Nyang
    • 1
  1. 1.Information Security Research LaboratoryINHA UniversityKorea

Personalised recommendations