An efficient and secure RFID security method with ownership transfer

42Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Radio Frequency Identification (RFID) has come under the spotlight as technology supporting ubiquitous society. But now, we face several security problems and challenges in RFID systems. Recent papers have reported that RFID systems have to achieve the following requirements: (1) Indistinguishability, (2) Forward Security, (3) Replay Attack resistance, (4) Tag Killing resistance, and (5) Ownership Transferability. We have to design RFID system that achieves the above-mentioned requirements. The previous security methods achieve only some of them individually, and no RFID system has been constructed that achieves all requirements. In this paper, we propose an RFID security method that achieves all requirements based on a hash function and a symmetric key cryptosystem. In addition, our proposed method provides not only high-security but also high-efficiency. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Osaka, K., Takagi, T., Yamazaki, K., & Takahashi, O. (2007). An efficient and secure RFID security method with ownership transfer. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4456 LNAI, pp. 778–787). Springer Verlag. https://doi.org/10.1007/978-3-540-74377-4_81

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free