RFID Tag Anti-Collision Security Study and Evaluation

Article Preview

Abstract:

For tag anti-collision algorithm in the current RFID system, considering the problems of tag privacy leakage and tag being tracked, a security solution based on Hash function was put forward. A theoretical analysis and a security evaluation about the proposed solution are also made. Through the analysis and evaluation, it turns out that this solution can prevent tag from privacy leaking, being tracked, cloning and counterfeit.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1250-1256

Citation:

Online since:

April 2015

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Y. Tiantian, RFID Research and Design on Security Authentication Protocol, Chengdu, Southwest Jiaotong University, (2010).

Google Scholar

[2] X. Zhiguo, RFID System Tag Anti-collision Algorithm and Security Protocol Research.Changsha, Hunan University, (2010).

Google Scholar

[3] Z. Ting, Research and Design on Radio Frequency Identification Security Protocol.Beijing, Beijing University of Posts and Telecommunications, (2011).

Google Scholar

[4] G. Huidan, RFID Provably Secure Communication Protocol in RFID System.Wuhan, Central China Normal University, (2012).

Google Scholar

[5] A. Juels, RFID security and privacy:A research survey, J.Selected Areas in Commun. IEEE J. 24, 2 (2006) 381-394.

DOI: 10.1109/jsac.2005.861395

Google Scholar

[6] T. Hjorth, Supporting privacy in RFID systems, Lyngby, Technical University of Denmark, (2004).

Google Scholar

[7] Y. Jiang and R. Zhang, An Adaptive Combination Query Tree Protocol for Tag Identification in RFID Systems, J. Commun. Letters,IEEE. 16, 8 (2012) 1192-1195.

DOI: 10.1109/lcomm.2012.060112.120345

Google Scholar

[8] K. Chen and B. Li, An Improved Query Tree Anti-Collision Algorithm Using Collision Location, J.Eng. Tech. 5, 8 (2013) 2494-2498.

DOI: 10.19026/rjaset.5.4685

Google Scholar