Radio Frequency Identification (RFID) is considered to be a promising identification approach in ubiquitous sensing technology. The operation of RFID systems in advanced applications may pose security and privacy risks to both organizations and individuals. In this paper, using randomly Key-Changed Identification, we propose an eavesdroppingproof security protocol based on cryptographic one way hash functions for passive RFID tags. Compared with several existing methods, our proposed protocol shows some security improvements as well as gives a reasonable and compatible approach that could be easily employed in practical situations. Finally, an illustration is also given to show clearly the whole operating procedure of the proposed procedure. RFID (Radio Frequency Identification), Security Protocol, Hash Functions, Randomly Key-Changed Identification. © Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
Zhai, J., Park, C. M., & Wang, G. N. (2006). Hash-based RFID security protocol using randomly key-changed identification procedure. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3983 LNCS, pp. 296–305). Springer Verlag. https://doi.org/10.1007/11751632_32
Mendeley helps you to discover research relevant for your work.