Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment 


Vol. 12,  No. 3, pp. 309-316, Jun.  2005
10.3745/KIPSTC.2005.12.3.309


PDF
  Abstract

Recently, RFID system is a main technology to realize ubiquitous computing environments, but the feature of the RFID system may bring about various privacy problem. So, many kinds of protocols to resolve this problem are researched. In this paper, we analyse the privacy problem of the previous methods and propose more secure and effective authentication protocol to protect user's privacy. Then we prove that the proposed protocol is secure and effective as we compare the proposed protocol with previous methods. The proposed protocol is based on Challenge-Response using one-way hash function and random number. The proposed protocol is secure against replay attack, spoofing attack and so on. In addition, the proposed protocol is proper for distributed database environment.

  Statistics


  Cite this article

[IEEE Style]

K. W. Rhee, D. K. Oh, J. Kwak, S. H. Oh, S. J. Kim, D. H. Won, "Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment," The KIPS Transactions:PartC, vol. 12, no. 3, pp. 309-316, 2005. DOI: 10.3745/KIPSTC.2005.12.3.309.

[ACM Style]

Keun Woo Rhee, Dong Kyu Oh, Jin Kwak, Soo Hyun Oh, Seung Joo Kim, and Dong Ho Won. 2005. Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment. The KIPS Transactions:PartC, 12, 3, (2005), 309-316. DOI: 10.3745/KIPSTC.2005.12.3.309.