Efficient RFID authentication protocol for ubiquitous computing environment

Eun Young Choi, Su Mi Lee, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

56 Citations (Scopus)


Radio Frequency identificiation (RFID) will become an important technology in remotely object identification systems. However, the use of RFID tags may create new threats to the security and privacy of individuals holding RFID tags. These threats bring several problems which are information leakage of a tag, location trace of individuals and impersonation of a tag. Low-cost RFID systems have much restrictions such as the limited computing power, passive power mechanism and low storage space. Therefore, the cost of tag's computation should be considered as an important factor in low-cost RFID systems. We propose an authentication protocol, OHLCAP which requires only one one-way hash function operation and hence is very efficient. Furthermore, our protocol is suitable to ubiquitous computing environment.

Original languageEnglish
Title of host publicationEmbedded and Ubiquitous Computing - EUC 2005 Workshops
Subtitle of host publicationUISW, NCUS, SecUbiq, USN, and TAUES, Proceedings
EditorsTomoya Enokido, Lu Yan, Bin Xiao, Daeyoung Kim, Yuanshun Dai, Laurence T. Yang
PublisherSpringer Verlag
Number of pages10
ISBN (Print)3540308032, 9783540308034
Publication statusPublished - 2005
EventEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES - Nagasaki, Japan
Duration: 2005 Dec 62005 Dec 9

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3823 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


OtherEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'Efficient RFID authentication protocol for ubiquitous computing environment'. Together they form a unique fingerprint.

Cite this