Challenge-eesponse based RFID authentication protocol for distributed database environment

  • Authors:
  • Keunwoo Rhee;Jin Kwak;Seungjoo Kim;Dongho Won

  • Affiliations:
  • Information and Communication Security Lab, School of Information and Communication Engineering, Sungkyunkwan University, Gyeonggi-do, Korea;Information and Communication Security Lab, School of Information and Communication Engineering, Sungkyunkwan University, Gyeonggi-do, Korea;Information Security and Cryptology Lab, School of Information and Communication Engineering, Sungkyunkwan University, Gyeonggi-do, Korea;Information and Communication Security Lab, School of Information and Communication Engineering, Sungkyunkwan University, Gyeonggi-do, Korea

  • Venue:
  • SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recently, RFID system is a main technology to realize ubiquitous computing environments, but the feature of the RFID system may bring about various privacy problems. So, many kinds of protocols to resolve these problems have been researched. In this paper, we analyze the privacy problems of the previous protocols and propose more secure and effective authentication protocol to protect user's privacy. Then we analyze the security and effectiveness of the proposed protocol comparing with the previous protocols. The proposed protocol is based on Challenge-Response using one-way hash function and random number. The proposed protocol is secure against the replay the attack, spoofing attack and so on. In addition, the proposed protocol is fitted for distributed database environment.