Efficient RFID authentication protocol for minimizing RFID tag computation

Keunwoo Rhee, Jin Kwak, Wan S. Yi, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seung-Joo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

RFID systems have become vital technology for realizing ubiquitous computing environments. However, features of RFID systems present potential security and privacy problems. In an effort to resolve these problems, many kinds of security and privacy enhancement technologies have been researched. However, solutions produced to date still have flaws and are not sufficiently effective for real RFID systems such as the EPCglobal network™. Therefore, in this paper, to make RFID systems more secure and efficient, improved technology based on password, is proposed. The proposed technology combines an encryption algorithm with a password-derived key, and can be applied to low-cost RFID systems for enhancing the security and privacy of these systems.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages607-616
Number of pages10
Volume4413 LNAI
Publication statusPublished - 2007 Dec 1
Externally publishedYes
Event1st International Conference on Hybrid Information Technology, ICHIT 2006 - Jeju Island, Korea, Republic of
Duration: 2006 Nov 92006 Nov 11

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4413 LNAI
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other1st International Conference on Hybrid Information Technology, ICHIT 2006
CountryKorea, Republic of
CityJeju Island
Period06/11/906/11/11

Keywords

  • Authentication
  • Encryption algorithm
  • EPCglobal network™
  • Password
  • Password-derived key
  • RFID

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'Efficient RFID authentication protocol for minimizing RFID tag computation'. Together they form a unique fingerprint.

  • Cite this

    Rhee, K., Kwak, J., Yi, W. S., Park, C., Park, S., Yang, H., Kim, S-J., & Won, D. (2007). Efficient RFID authentication protocol for minimizing RFID tag computation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4413 LNAI, pp. 607-616). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4413 LNAI).