Efficient RFID authentication protocol for minimizing RFID tag computation

Keunwoo Rhee, Jin Kwak, Wan S. Yi, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

RFID systems have become vital technology for realizing ubiquitous computing environments. However, features of RFID systems present potential security and privacy problems. In an effort to resolve these problems, many kinds of security and privacy enhancement technologies have been researched. However, solutions produced to date still have flaws and are not sufficiently effective for real RFID systems such as the EPCglobal network™. Therefore, in this paper, to make RFID systems more secure and efficient, improved technology based on password, is proposed. The proposed technology combines an encryption algorithm with a password-derived key, and can be applied to low-cost RFID systems for enhancing the security and privacy of these systems.

Original languageEnglish
Title of host publicationAdvances in Hybrid Information Technology - First International Conference, ICHIT 2006, Revised Selected Papers
PublisherSpringer Verlag
Pages607-616
Number of pages10
ISBN (Print)3540773673, 9783540773672
DOIs
Publication statusPublished - 2007
Externally publishedYes
Event1st International Conference on Hybrid Information Technology, ICHIT 2006 - Jeju Island, Korea, Republic of
Duration: 2006 Nov 92006 Nov 11

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4413 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st International Conference on Hybrid Information Technology, ICHIT 2006
Country/TerritoryKorea, Republic of
CityJeju Island
Period06/11/906/11/11

Keywords

  • Authentication
  • EPCglobal network™
  • Encryption algorithm
  • Password
  • Password-derived key
  • RFID

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Efficient RFID authentication protocol for minimizing RFID tag computation'. Together they form a unique fingerprint.

Cite this