An Efficient and Secure RFID Security Method with Ownership Transfer

  • Osaka K
  • Takagi T
  • Yamazaki K
  • et al.
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Radio frequency identification (RFID) has come under the spotlight as technology supporting ubiquitous society. But now, we face several security problems and challenges in RFID systems. Recent papers have reported that RFID systems have to achieve the following requirements: (1) indistinguishability; (2) forward security; (3) replay attack; (4) tag killing; and (5) ownership transfer. We have to design RFID system that achieves the above-mentioned requirements. The previous methods achieve only some of them individually, and no RFID system has been constructed that achieves all requirements. In this paper, we propose an RFID security method that achieves all requirements based on a hash function and a symmetric key cryptosystem. In addition, our proposed method provides not only high-security but also high-efficiency

Cite

CITATION STYLE

APA

Osaka, K., Takagi, T., Yamazaki, K., & Takahashi, O. (2008). An Efficient and Secure RFID Security Method with Ownership Transfer. In RFID Security (pp. 147–176). Springer US. https://doi.org/10.1007/978-0-387-76481-8_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free