Enhanced hash-based RFID mutual authentication protocol

9Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Radio frequency identification (RFID) system is a promising automatic identification technology that uses communication via radio waves to identify and track moving objects. Privacy and security concerns inhibit the fast adaption of RFID technology for many applications. A number of authentication protocols that address these concerns have been proposed but real-world solutions that are secure and maintain low communication cost are still needed and being investigated. Recently, Cho et al. proposed a hash-based RFID mutual authentication protocol and the protocol is secure. However, this paper proposes an enhanced hash-based RFID mutual authentication protocol to remedy the desynchronization problem in the previous protocol. This protocol requires little computation and achieves both privacy and authentication, making it sufficient enough for use in supply chain management. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Kim, H. (2012). Enhanced hash-based RFID mutual authentication protocol. In Communications in Computer and Information Science (Vol. 339 CCIS, pp. 70–77). https://doi.org/10.1007/978-3-642-35264-5_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free