Skip to main content
Log in

RHS-US: Real-Time Hash-Chain Scheme Decreasing Pre-Calculation Mechanism for Ubiquitous Services

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In the ubiquitous society of the near future, various customer-oriented intellectual services will be required where RFID systems using wireless recognition technology are widely applied. In these RFID systems, it is important to protect personal information during wireless communication, as well as to keep the price of relative tags affordable. In addition, it is important to make the registration and removal of tags easy, and maintain the processing speed even when the number of tags increases. In this paper, we propose a real-time hash-chain scheme decreasing the pre-calculation mechanism to provide RFID efficiency for ubiquitous services (RHS-US). RHS-US provides a synchronization method between the tag and backend server to improve efficiency during normal authentication by providing fast processing time, while protecting personal information perfectly during abnormal authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Avoine, G. (2005). Adversary model for radio frequency identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland.

  2. Avoine, G., & Oechslin, P. (2005). A scalable and provably secure hash based RFID protocol. In International Workshop on Pervasive Computing and Communication Security—PerSec 2005 (pp. 110–114). IEEE, IEEE Computer Society Press, Kauai Island, Hawaii, USA.

  3. Benetton undecided on use of ‘smart Tags’. (2003). Associated Press.

  4. Choi, B. Y., Lee, D. G., Park, J. H., & Choi, K. N. (2006). Rhdp-scheme for rfid’s efficiency improvement on the ubiquitous computing. In D. S. Huang, K. Li, & G. W. Irwin (Eds.), International Conference on Intelligent Computing (ICIC 2006), LNCIS (Vol. 344, pp. 1068–1077). Springer.

  5. CNET: Wal-mart cancels ’smart shelf’ trial. (2003). http://www.cnet.com.

  6. Henrici, D., & Müller, P. (2004). Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In R. Sandhu & R. Thomas (Eds.), International Workshop on Pervasive Computing and Communication Security—PerSec 2004 (pp. 149–153). IEEE, IEEE Computer Society, Orlando, Florida, USA.

  7. Ishikawa, T., Yumoto, Y., Kurata, M., Endo, M., Kinoshita, S., Hoshino, F., Yagi, S., & Nomachi, M. (2003). Applying auto-id to the japanese publication business. White Paper KEI-AUTOID-WH-004, Auto-ID Center, Keio University, Shonan-Fujisawa, Kanagawa, Japan.

  8. Lee, S., Asano, T., & Kim, K. (2006). RFID mutual authentication scheme based on synchronized secret information. In Symposium on Cryptography and Information Security. Hiroshima, Japan.

  9. Ohkubo, M., Suzuki, K., & Kinoshita, S. (2003). Cryptographic approach to “privacy-friendly” tags. In RFID Privacy Workshop. MIT, MA, USA.

  10. Ohkubo, M., Suzuki, K., & Kinoshita, S. (2004). Efficient hash-chain based RFID privacy protection scheme. In International Conference on Ubiquitous Computing—Ubicomp, Workshop Privacy: Current Status and Future Directions. Nottingham, England.

  11. Yeo S.S., Kim S.K. (2005) Scalable and flexible privacy protection scheme for RFID systems. In: Molva R., Tsudik G., Westhoff D. (eds) European Workshop on Security and Privacy in Ad hoc and Sensor Networks—ESAS’05, Lecture Notes in Computer Science Vol. 3813. Springer-Verlag, Visegrad, Hungary, pp 153–163

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Heai-Jo Kang.

Additional information

This research was supported by Kyungnam University, Korea.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lee, D.G., Park, J.H., Kang, HJ. et al. RHS-US: Real-Time Hash-Chain Scheme Decreasing Pre-Calculation Mechanism for Ubiquitous Services. Wireless Pers Commun 51, 193–207 (2009). https://doi.org/10.1007/s11277-008-9600-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-008-9600-4

Keywords

Navigation