Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2015, Article ID 498610, 11 pages
http://dx.doi.org/10.1155/2015/498610
Research Article

Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol

1Hitachi Ltd., Research & Development Group, Center for Technology Innovation-Systems Engineering, 292 Yoshida-cho, Totsuka-ku, Yokohama, Kanagawa 244-0817, Japan
2Department of Informatics, The University of Electro-Communications, 1-5-1 Chofugaoka, Chofu, Tokyo 182-8585, Japan

Received 24 April 2015; Revised 18 August 2015; Accepted 23 August 2015

Academic Editor: Israel Koren

Copyright © 2015 Shugo Mikami et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. IDTechEx, “RFID Forecasts, Players and Opportunities 2014–2024,” 2014.
  2. S. Piramuthu, “Lightweight cryptographic authentication in passive RFID-Tagged systems,” IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, vol. 38, no. 3, pp. 360–376, 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. G. Avoine, M. A. Bingöl, X. Carpent, and S. B. O. Yalcin, “Privacy-friendly authentication in RFID systems: on sublinear protocols based on symmetric-key cryptography,” IEEE Transactions on Mobile Computing, vol. 12, no. 10, pp. 2037–2049, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. D.-Z. Sun and J.-D. Zhong, “A hash-based RFID security protocol for strong privacy protection,” IEEE Transactions on Consumer Electronics, vol. 58, no. 4, pp. 1246–1252, 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. V. Dixit, H. K. Verma, and A. K. Singh, “Comparison of various Security Protocols in RFID,” International Journal of Computer Applications, vol. 24, no. 7, pp. 17–21, 2011. View at Publisher · View at Google Scholar
  6. M. Ohkubo, K. Suzuki, and S. Kinoshita, “RFID privacy issues and technical challenges,” Communications of the ACM, vol. 48, no. 9, pp. 66–71, 2005. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Hanatani, M. Ohkubo, S. Matsuo, K. Sakiyama, and K. Ohta, “A study on computational formal verification for practical cryptographic protocol: the case of synchronous RFID authentication,” in Proceedings of the Financial Cryptography and Data Security Workshops (FC '11), vol. 7126 of Lecture Notes in Computer Science, pp. 70–87, Springer, 2012. View at Google Scholar
  8. A. Bogdanov, M. Knežević, G. Leander, D. Toz, K. Varıcı, and I. Verbauwhede, “SPONGENT: the design space of lightweight cryptographic hashing,” IEEE Transactions on Computers, vol. 62, no. 10, pp. 2041–2053, 2013. View at Publisher · View at Google Scholar · View at MathSciNet
  9. G. Bertoni, J. Daemen, M. Peeters, and G. van Assche, “The making of KECCAK,” Cryptologia, vol. 38, no. 1, pp. 26–60, 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. Y. Li, S. Mikami, D. Watanabe, K. Ohta, and K. Sakiyama, “Singlechip implementation and evaluation of passive UHF RFID tag with hash-based mutual authentication,” in Proceedings of the Workshop on RFID Security (RFIDsec'14 Asia), vol. 12 of Cryptology and Information Security Series, pp. 3–15, IOS Press, 2014. View at Google Scholar
  11. GSI Information Security Group, “RFID Security & Privacy Rounge,” http://www.avoine.net/rfid/.
  12. H. T. Friis, “A note on a simple transmission formula,” Proceedings of the IRE, vol. 34, no. 5, pp. 254–256, 1946. View at Google Scholar
  13. L. Batina, A. Das, B. Ege et al., “Dietary recommendations for lightweight block ciphers: power, energy and area analysis of recently developed architectures,” in Proceedings of the Security and Privacy Issues 9th International Workshop (RFIDsec '13), vol. 8262 of Lecture Notes in Computer Science, pp. 103–112, Springer, 2013. View at Google Scholar
  14. S. Kerckhof, F. Durvaux, C. Hocquet, D. Bol, and F.-X. Standaert, “Towards green cryptography: a comparison of lightweight ciphers from the energy viewpoint,” in Cryptographic Hardware and Embedded Systems—CHES 2012: 14th International Workshop, Leuven, Belgium, September 9–12, 2012. Proceedings, vol. 7428 of Lecture Notes in Computer Science, pp. 390–407, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar
  15. J. Wang, H. Li, and F. Yu, “Design of secure and low-cost RFID tag baseband,” in Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '07), pp. 2066–2069, IEEE, Shanghai, China, September 2007. View at Publisher · View at Google Scholar · View at Scopus
  16. G. Avoine, M. A. Bingöl, X. Carpent, and S. Kardas, “Deploying OSK on low-resource mobile devices,” in Radio Frequency Identification: Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9–11, 2013, Revised Selected Papers, vol. 8262 of Lecture Notes in Computer Science, pp. 3–18, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  17. J. Ertl, T. Plos, M. Feldhofer, N. Felber, and L. Henzen, “A security-enhanced UHF RFID tag chip,” in Proceedings of the Euromicro Conference on Digital System Design (DSD '13), pp. 705–712, IEEE, Los Alamitos, Calif, USA, September 2013. View at Publisher · View at Google Scholar
  18. National Institute for Standards and Technology, Announcing the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, National Institute for Standards and Technology, Gaithersburg, Md, USA, 2001.
  19. M. Agren, M. Hell, T. Johansson, and W. Meier, “Grain-128a: a new version of Grain-128 with optional authentication,” International Journal of Wireless and Mobile Computing, vol. 5, no. 1, pp. 48–59, 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. M. Hell, T. Johansson, and W. Meier, “Grain: a stream cipher for constrained environments,” International Journal of Wireless and Mobile Computing, vol. 2, no. 1, pp. 86–93, 2007. View at Publisher · View at Google Scholar · View at Scopus
  21. A. Poschmann, M. J. B. Robshaw, F. Vater, and C. Paar, “Lightweight cryptography and RFID: tackling the hidden overhead,” KSII Transactions on Internet and Information Systems, vol. 4, no. 2, pp. 98–116, 2010. View at Publisher · View at Google Scholar · View at Scopus
  22. A. Bogdanov, L. R. Knudsen, G. Leander et al., “PRESENT: an ultra-lightweight block cipher,” in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES '07), vol. 4727 of Lecture Notes in Computer Science, pp. 450–466, Springer, 2007. View at Google Scholar
  23. ORIDAO, “Secured EPC Gen2 RFID ASIC”.
  24. NXP Semiconductors, “MIFARE DESFire EV1”.
  25. H. Martin, E. S. Millan, P. Peris-Lopez, and J. E. Tapiador, “Efficient ASIC implementation and analysis of Two EPC-C1G2 RFID authentication protocols,” IEEE Sensors Journal, vol. 13, no. 10, pp. 3537–3547, 2013. View at Publisher · View at Google Scholar · View at Scopus
  26. Z. Liu, D. Liu, L. Li, H. Lin, and Z. Yong, “Implementation of a new RFID authentication protocol for EPC Gen2 standard,” IEEE Sensors Journal, vol. 15, no. 2, pp. 1003–1011, 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. ECRYPT II, ECRYPT II Yearly Report on Algorithms and Key Lengths, 2012, http://cordis.europa.eu/docs/projects/cnect/6/216676/080/deliverables/002-DSPA20.pdf.
  28. J.-P. Aumasson, L. Henzen, W. Meier, and M. Naya-Plasencia, “QUARK: a lightweight hash,” Journal of Cryptology, vol. 26, no. 2, pp. 313–339, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  29. J. Guo, T. Peyrin, and A. Poschmann, “The PHOTON family of lightweight hash functions,” in Advances in Cryptology—CRYPTO 2011, vol. 6841 of Lecture Notes in Computer Science, pp. 222–239, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  30. National Institute for Standards and Technology, “Recommendation for key management: part 1: general (revision 3),” Special Publication 800-57, NIST, 2012. View at Google Scholar
  31. National Institute for Standards and Technology, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, Special Publication 800-90A, National Institute for Standards and Technology, Gaithersburg, Md, USA, 2012.
  32. M. Qazi, M. Clinton, S. Bartling, and A. P. Chandrakasan, “A low-voltage 1 Mb FRAM in 0.13 μm CMOS featuring time-to-digital sensing for expanded operating margin,” IEEE Journal of Solid-State Circuits, vol. 47, no. 1, pp. 141–150, 2012. View at Publisher · View at Google Scholar