Abstract
In the ubiquitous society of the near future, various customer-oriented intellectual services will be required where RFID systems using wireless recognition technology are widely applied. In these RFID systems, it is important to protect personal information during wireless communication, as well as to keep the price of relative tags affordable. In addition, it is important to make the registration and removal of tags easy, and maintain the processing speed even when the number of tags increases. In this paper, we propose a real-time hash-chain scheme decreasing the pre-calculation mechanism to provide RFID efficiency for ubiquitous services (RHS-US). RHS-US provides a synchronization method between the tag and backend server to improve efficiency during normal authentication by providing fast processing time, while protecting personal information perfectly during abnormal authentication.
Similar content being viewed by others
References
Avoine, G. (2005). Adversary model for radio frequency identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland.
Avoine, G., & Oechslin, P. (2005). A scalable and provably secure hash based RFID protocol. In International Workshop on Pervasive Computing and Communication Security—PerSec 2005 (pp. 110–114). IEEE, IEEE Computer Society Press, Kauai Island, Hawaii, USA.
Benetton undecided on use of ‘smart Tags’. (2003). Associated Press.
Choi, B. Y., Lee, D. G., Park, J. H., & Choi, K. N. (2006). Rhdp-scheme for rfid’s efficiency improvement on the ubiquitous computing. In D. S. Huang, K. Li, & G. W. Irwin (Eds.), International Conference on Intelligent Computing (ICIC 2006), LNCIS (Vol. 344, pp. 1068–1077). Springer.
CNET: Wal-mart cancels ’smart shelf’ trial. (2003). http://www.cnet.com.
Henrici, D., & Müller, P. (2004). Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In R. Sandhu & R. Thomas (Eds.), International Workshop on Pervasive Computing and Communication Security—PerSec 2004 (pp. 149–153). IEEE, IEEE Computer Society, Orlando, Florida, USA.
Ishikawa, T., Yumoto, Y., Kurata, M., Endo, M., Kinoshita, S., Hoshino, F., Yagi, S., & Nomachi, M. (2003). Applying auto-id to the japanese publication business. White Paper KEI-AUTOID-WH-004, Auto-ID Center, Keio University, Shonan-Fujisawa, Kanagawa, Japan.
Lee, S., Asano, T., & Kim, K. (2006). RFID mutual authentication scheme based on synchronized secret information. In Symposium on Cryptography and Information Security. Hiroshima, Japan.
Ohkubo, M., Suzuki, K., & Kinoshita, S. (2003). Cryptographic approach to “privacy-friendly” tags. In RFID Privacy Workshop. MIT, MA, USA.
Ohkubo, M., Suzuki, K., & Kinoshita, S. (2004). Efficient hash-chain based RFID privacy protection scheme. In International Conference on Ubiquitous Computing—Ubicomp, Workshop Privacy: Current Status and Future Directions. Nottingham, England.
Yeo S.S., Kim S.K. (2005) Scalable and flexible privacy protection scheme for RFID systems. In: Molva R., Tsudik G., Westhoff D. (eds) European Workshop on Security and Privacy in Ad hoc and Sensor Networks—ESAS’05, Lecture Notes in Computer Science Vol. 3813. Springer-Verlag, Visegrad, Hungary, pp 153–163
Author information
Authors and Affiliations
Corresponding author
Additional information
This research was supported by Kyungnam University, Korea.
Rights and permissions
About this article
Cite this article
Lee, D.G., Park, J.H., Kang, HJ. et al. RHS-US: Real-Time Hash-Chain Scheme Decreasing Pre-Calculation Mechanism for Ubiquitous Services. Wireless Pers Commun 51, 193–207 (2009). https://doi.org/10.1007/s11277-008-9600-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-008-9600-4