RFID Secure Protocol Based on Time-Based Hash Chain

Article Preview

Abstract:

This paper describes several typical RFID privacy protection protocol security methods. To improve the security of RFID protocols, which proposed in the literature and some deficiencies, propose a new time-based hash chain function. The program can be effective against security issues, such as unauthorized reading, location tracking, eavesdropping, spoofing, replay and etc. The program applies to a higher number of tags and readers, with better security and efficiency.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

225-229

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] K. Finkenzeller, RFID handbook: fundamentals and applications in contactless smart cards and identification, John Wiley & Sons, Inc., (2003).

DOI: 10.1145/1005062.1005077

Google Scholar

[2] S.E. Sarma, S.A. Weis, D.W. Engels, RFID systems and security and privacy implications. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHES 2002). Lectures Notes in Computer Science 2523. Springer-Verlag, Berlin. (2003).

DOI: 10.1007/3-540-36400-5_33

Google Scholar

[3] S.E. Sarma, S.A. Weis, D.W. Engels, Radio frequency identification: Secure risks and challenges, RSA Laboratories Cryptobytes. 6 (2003) 2-9.

Google Scholar

[4] M. Ohkubo, K. Suzuki, S. Kinoshita, Hash-chain based forward secure privacy protection scheme for low-cost RFID, Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai. (2004) 719-724.

Google Scholar

[5] K. Rhee, J. Kwak, S. Kim, Challenge-response based RFID authentication protocol for distributed database environment. Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005). Lectures Notes in Computer Science 3450, Springer-Verlag, Berlin. (2005).

DOI: 10.1007/978-3-540-32004-3_9

Google Scholar

[6] G. Lin, Y. Wang, Y. Zhan, RFID Secure Protocol Based on Random Sequence, Computer Engineering, 20 (2008) 151-153.

Google Scholar

[7] Z. Ding, L. Guo, Y. Wang, An authentication protocol based on key array for RFID, Journal of Electronics & Information Technology. 31 (2009) 722-726.

Google Scholar

[8] S. Yuan, H. Dai, S. Lai, Hash-based RFID Authentication Protocol, Computer Engineering. 34 (2008) 141-143.

Google Scholar