Efficient RFID authentication protocol for minimizing RFID tag computation

Keunwoo Rhee, Jin Kwak, Wan S. Yi, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seung-Joo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

RFID systems have become vital technology for realizing ubiquitous computing environments. However, features of RFID systems present potential security and privacy problems. In an effort to resolve these problems, many kinds of security and privacy enhancement technologies have been researched. However, solutions produced to date still have flaws and are not sufficiently effective for real RFID systems such as the EPCglobal network™. Therefore, in this paper, to make RFID systems more secure and efficient, improved technology based on password, is proposed. The proposed technology combines an encryption algorithm with a password-derived key, and can be applied to low-cost RFID systems for enhancing the security and privacy of these systems.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages607-616
Number of pages10
Volume4413 LNAI
Publication statusPublished - 2007 Dec 1
Externally publishedYes
Event1st International Conference on Hybrid Information Technology, ICHIT 2006 - Jeju Island, Korea, Republic of
Duration: 2006 Nov 92006 Nov 11

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4413 LNAI
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other1st International Conference on Hybrid Information Technology, ICHIT 2006
CountryKorea, Republic of
CityJeju Island
Period06/11/906/11/11

Fingerprint

Radio Frequency Identification Device
Authentication Protocol
Radio Frequency Identification
Radio frequency identification (RFID)
Authentication
Privacy
Network protocols
Technology
Password
Biomedical Enhancement
Ubiquitous computing
Ubiquitous Computing
Cryptography
Computer systems
Encryption
Resolve
Costs and Cost Analysis
Enhancement
Defects
Costs

Keywords

  • Authentication
  • Encryption algorithm
  • EPCglobal network™
  • Password
  • Password-derived key
  • RFID

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Rhee, K., Kwak, J., Yi, W. S., Park, C., Park, S., Yang, H., ... Won, D. (2007). Efficient RFID authentication protocol for minimizing RFID tag computation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4413 LNAI, pp. 607-616). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4413 LNAI).

Efficient RFID authentication protocol for minimizing RFID tag computation. / Rhee, Keunwoo; Kwak, Jin; Yi, Wan S.; Park, Chanho; Park, Sangjoon; Yang, Hyungkyu; Kim, Seung-Joo; Won, Dongho.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4413 LNAI 2007. p. 607-616 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4413 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rhee, K, Kwak, J, Yi, WS, Park, C, Park, S, Yang, H, Kim, S-J & Won, D 2007, Efficient RFID authentication protocol for minimizing RFID tag computation. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 4413 LNAI, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4413 LNAI, pp. 607-616, 1st International Conference on Hybrid Information Technology, ICHIT 2006, Jeju Island, Korea, Republic of, 06/11/9.
Rhee K, Kwak J, Yi WS, Park C, Park S, Yang H et al. Efficient RFID authentication protocol for minimizing RFID tag computation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4413 LNAI. 2007. p. 607-616. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Rhee, Keunwoo ; Kwak, Jin ; Yi, Wan S. ; Park, Chanho ; Park, Sangjoon ; Yang, Hyungkyu ; Kim, Seung-Joo ; Won, Dongho. / Efficient RFID authentication protocol for minimizing RFID tag computation. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4413 LNAI 2007. pp. 607-616 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{351403faea48485d877e89c9fa9f45da,
title = "Efficient RFID authentication protocol for minimizing RFID tag computation",
abstract = "RFID systems have become vital technology for realizing ubiquitous computing environments. However, features of RFID systems present potential security and privacy problems. In an effort to resolve these problems, many kinds of security and privacy enhancement technologies have been researched. However, solutions produced to date still have flaws and are not sufficiently effective for real RFID systems such as the EPCglobal network™. Therefore, in this paper, to make RFID systems more secure and efficient, improved technology based on password, is proposed. The proposed technology combines an encryption algorithm with a password-derived key, and can be applied to low-cost RFID systems for enhancing the security and privacy of these systems.",
keywords = "Authentication, Encryption algorithm, EPCglobal network™, Password, Password-derived key, RFID",
author = "Keunwoo Rhee and Jin Kwak and Yi, {Wan S.} and Chanho Park and Sangjoon Park and Hyungkyu Yang and Seung-Joo Kim and Dongho Won",
year = "2007",
month = "12",
day = "1",
language = "English",
isbn = "3540773673",
volume = "4413 LNAI",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "607--616",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Efficient RFID authentication protocol for minimizing RFID tag computation

AU - Rhee, Keunwoo

AU - Kwak, Jin

AU - Yi, Wan S.

AU - Park, Chanho

AU - Park, Sangjoon

AU - Yang, Hyungkyu

AU - Kim, Seung-Joo

AU - Won, Dongho

PY - 2007/12/1

Y1 - 2007/12/1

N2 - RFID systems have become vital technology for realizing ubiquitous computing environments. However, features of RFID systems present potential security and privacy problems. In an effort to resolve these problems, many kinds of security and privacy enhancement technologies have been researched. However, solutions produced to date still have flaws and are not sufficiently effective for real RFID systems such as the EPCglobal network™. Therefore, in this paper, to make RFID systems more secure and efficient, improved technology based on password, is proposed. The proposed technology combines an encryption algorithm with a password-derived key, and can be applied to low-cost RFID systems for enhancing the security and privacy of these systems.

AB - RFID systems have become vital technology for realizing ubiquitous computing environments. However, features of RFID systems present potential security and privacy problems. In an effort to resolve these problems, many kinds of security and privacy enhancement technologies have been researched. However, solutions produced to date still have flaws and are not sufficiently effective for real RFID systems such as the EPCglobal network™. Therefore, in this paper, to make RFID systems more secure and efficient, improved technology based on password, is proposed. The proposed technology combines an encryption algorithm with a password-derived key, and can be applied to low-cost RFID systems for enhancing the security and privacy of these systems.

KW - Authentication

KW - Encryption algorithm

KW - EPCglobal network™

KW - Password

KW - Password-derived key

KW - RFID

UR - http://www.scopus.com/inward/record.url?scp=38549125960&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=38549125960&partnerID=8YFLogxK

M3 - Conference contribution

SN - 3540773673

SN - 9783540773672

VL - 4413 LNAI

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 607

EP - 616

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -