Challenge-response based RFID authentication protocol for distributed database environment

Keunwoo Rhee, Jin Kwak, Seung-Joo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

152 Citations (Scopus)

Abstract

Recently, RFID system is a main technology to realize ubiquitous computing environments, but the feature of the RFID system may bring about various privacy problems. So, many kinds of protocols to resolve these problems have been researched. In this paper, we analyze the privacy problems of the previous protocols and propose more secure and effective authentication protocol to protect user's privacy. Then we analyze the security and effectiveness of the proposed protocol comparing with the previous protocols. The proposed protocol is based on Challenge-Response using one-way hash function and random number. The proposed protocol is secure against the replay the attack, spoofing attack and so on. In addition, the proposed protocol is fitted for distributed database environment.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science
EditorsD. Hutter, M. Ullmann
Pages70-84
Number of pages15
Volume3450
Publication statusPublished - 2005
Externally publishedYes
EventSecond International Conference on Security in Pervasive Computing, SPC 2005 - Boppard, Germany
Duration: 2005 Apr 62005 Apr 8

Other

OtherSecond International Conference on Security in Pervasive Computing, SPC 2005
CountryGermany
CityBoppard
Period05/4/605/4/8

Keywords

  • Authentication
  • Challenge-Response
  • RFID system

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Fingerprint Dive into the research topics of 'Challenge-response based RFID authentication protocol for distributed database environment'. Together they form a unique fingerprint.

  • Cite this

    Rhee, K., Kwak, J., Kim, S-J., & Won, D. (2005). Challenge-response based RFID authentication protocol for distributed database environment. In D. Hutter, & M. Ullmann (Eds.), Lecture Notes in Computer Science (Vol. 3450, pp. 70-84)