Abstract
Recently, RFID system is a main technology to realize ubiquitous computing environments, but the feature of the RFID system may bring about various privacy problems. So, many kinds of protocols to resolve these problems have been researched. In this paper, we analyze the privacy problems of the previous protocols and propose more secure and effective authentication protocol to protect user's privacy. Then we analyze the security and effectiveness of the proposed protocol comparing with the previous protocols. The proposed protocol is based on Challenge-Response using one-way hash function and random number. The proposed protocol is secure against the replay the attack, spoofing attack and so on. In addition, the proposed protocol is fitted for distributed database environment.
Original language | English |
---|---|
Pages (from-to) | 70-84 |
Number of pages | 15 |
Journal | Lecture Notes in Computer Science |
Volume | 3450 |
DOIs | |
Publication status | Published - 2005 |
Externally published | Yes |
Event | Second International Conference on Security in Pervasive Computing, SPC 2005 - Boppard, Germany Duration: 2005 Apr 6 → 2005 Apr 8 |
Keywords
- Authentication
- Challenge-Response
- RFID system
ASJC Scopus subject areas
- Theoretical Computer Science
- Computer Science(all)