Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment


KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 3, pp. 309-316, Jun. 2005
10.3745/KIPSTC.2005.12.3.309,   PDF Download:

Abstract

Recently, RFID system is a main technology to realize ubiquitous computing environments, but the feature of the RFID system may bring about various privacy problem. So, many kinds of protocols to resolve this problem are researched. In this paper, we analyse the privacy problem of the previous methods and propose more secure and effective authentication protocol to protect user's privacy. Then we prove that the proposed protocol is secure and effective as we compare the proposed protocol with previous methods. The proposed protocol is based on Challenge-Response using one-way hash function and random number. The proposed protocol is secure against replay attack, spoofing attack and so on. In addition, the proposed protocol is proper for distributed database environment.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
K. W. Rhee, D. K. Oh, J. Kwak, S. H. Oh, S. J. Kim and D. H. Won, "Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment," KIPS Journal C (2001 ~ 2012) , vol. 12, no. 3, pp. 309-316, 2005. DOI: 10.3745/KIPSTC.2005.12.3.309.

[ACM Style]
Keun Woo Rhee, Dong Kyu Oh, Jin Kwak, Soo Hyun Oh, Seung Joo Kim, and Dong Ho Won. 2005. Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment. KIPS Journal C (2001 ~ 2012) , 12, 3, (2005), 309-316. DOI: 10.3745/KIPSTC.2005.12.3.309.