Challenge-response based RFID authentication protocol for distributed database environment

Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won

Research output: Contribution to journalConference articlepeer-review

189 Citations (Scopus)


Recently, RFID system is a main technology to realize ubiquitous computing environments, but the feature of the RFID system may bring about various privacy problems. So, many kinds of protocols to resolve these problems have been researched. In this paper, we analyze the privacy problems of the previous protocols and propose more secure and effective authentication protocol to protect user's privacy. Then we analyze the security and effectiveness of the proposed protocol comparing with the previous protocols. The proposed protocol is based on Challenge-Response using one-way hash function and random number. The proposed protocol is secure against the replay the attack, spoofing attack and so on. In addition, the proposed protocol is fitted for distributed database environment.

Original languageEnglish
Pages (from-to)70-84
Number of pages15
JournalLecture Notes in Computer Science
Publication statusPublished - 2005
Externally publishedYes
EventSecond International Conference on Security in Pervasive Computing, SPC 2005 - Boppard, Germany
Duration: 2005 Apr 62005 Apr 8


  • Authentication
  • Challenge-Response
  • RFID system

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'Challenge-response based RFID authentication protocol for distributed database environment'. Together they form a unique fingerprint.

Cite this