Hash-based RFID security protocol using randomly key-changed identification procedure

9Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Radio Frequency Identification (RFID) is considered to be a promising identification approach in ubiquitous sensing technology. The operation of RFID systems in advanced applications may pose security and privacy risks to both organizations and individuals. In this paper, using randomly Key-Changed Identification, we propose an eavesdroppingproof security protocol based on cryptographic one way hash functions for passive RFID tags. Compared with several existing methods, our proposed protocol shows some security improvements as well as gives a reasonable and compatible approach that could be easily employed in practical situations. Finally, an illustration is also given to show clearly the whole operating procedure of the proposed procedure. RFID (Radio Frequency Identification), Security Protocol, Hash Functions, Randomly Key-Changed Identification. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Zhai, J., Park, C. M., & Wang, G. N. (2006). Hash-based RFID security protocol using randomly key-changed identification procedure. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3983 LNCS, pp. 296–305). Springer Verlag. https://doi.org/10.1007/11751632_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free