Efficient RFID authentication protocol for ubiquitous computing environment

Eun Young Choi, Su Mi Lee, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

42 Citations (Scopus)

Abstract

Radio Frequency identificiation (RFID) will become an important technology in remotely object identification systems. However, the use of RFID tags may create new threats to the security and privacy of individuals holding RFID tags. These threats bring several problems which are information leakage of a tag, location trace of individuals and impersonation of a tag. Low-cost RFID systems have much restrictions such as the limited computing power, passive power mechanism and low storage space. Therefore, the cost of tag's computation should be considered as an important factor in low-cost RFID systems. We propose an authentication protocol, OHLCAP which requires only one one-way hash function operation and hence is very efficient. Furthermore, our protocol is suitable to ubiquitous computing environment.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages945-954
Number of pages10
Volume3823 LNCS
Publication statusPublished - 2005 Dec 1
EventEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES - Nagasaki, Japan
Duration: 2005 Dec 62005 Dec 9

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3823 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES
CountryJapan
CityNagasaki
Period05/12/605/12/9

    Fingerprint

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Choi, E. Y., Lee, S. M., & Lee, D. H. (2005). Efficient RFID authentication protocol for ubiquitous computing environment. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3823 LNCS, pp. 945-954). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3823 LNCS).