Efficient RFID authentication protocol for ubiquitous computing environment

Eun Young Choi, Su Mi Lee, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

42 Citations (Scopus)

Abstract

Radio Frequency identificiation (RFID) will become an important technology in remotely object identification systems. However, the use of RFID tags may create new threats to the security and privacy of individuals holding RFID tags. These threats bring several problems which are information leakage of a tag, location trace of individuals and impersonation of a tag. Low-cost RFID systems have much restrictions such as the limited computing power, passive power mechanism and low storage space. Therefore, the cost of tag's computation should be considered as an important factor in low-cost RFID systems. We propose an authentication protocol, OHLCAP which requires only one one-way hash function operation and hence is very efficient. Furthermore, our protocol is suitable to ubiquitous computing environment.

Original languageEnglish
Title of host publicationEmbedded and Ubiquitous Computing - EUC 2005 Workshops
Subtitle of host publicationUISW, NCUS, SecUbiq, USN, and TAUES, Proceedings
EditorsTomoya Enokido, Lu Yan, Bin Xiao, Daeyoung Kim, Yuanshun Dai, Laurence T. Yang
PublisherSpringer Verlag
Pages945-954
Number of pages10
ISBN (Print)3540308032, 9783540308034
DOIs
Publication statusPublished - 2005
EventEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES - Nagasaki, Japan
Duration: 2005 Dec 62005 Dec 9

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3823 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES
CountryJapan
CityNagasaki
Period05/12/605/12/9

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Efficient RFID authentication protocol for ubiquitous computing environment'. Together they form a unique fingerprint.

  • Cite this

    Choi, E. Y., Lee, S. M., & Lee, D. H. (2005). Efficient RFID authentication protocol for ubiquitous computing environment. In T. Enokido, L. Yan, B. Xiao, D. Kim, Y. Dai, & L. T. Yang (Eds.), Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings (pp. 945-954). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3823 LNCS). Springer Verlag. https://doi.org/10.1007/11596042_97