본문 바로가기
  • Home

RFID Security Authentication Protocol for the Ubiquitous Environment

  • Journal of The Korea Society of Computer and Information
  • Abbr : JKSCI
  • 2007, 12(4), pp.69-76
  • Publisher : The Korean Society Of Computer And Information
  • Research Area : Engineering > Computer Science

배우식 1 Choi Sin Hyeong 2 HAN KUN-HEE 3

1충북대학교
2강원대학교
3백석대학교

Accredited

ABSTRACT

On the wireless‐communication between RFID Tag and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash‐lock related algorithm. This paper has presented the comparison and analysis of the established hash‐lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real‐time and every session. The algorithm suggested here can offer a several of usefulness for RFID authentication system and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags’ operation with time based.

Citation status

* References for papers published after 2023 are currently being built.