Trust in RFID-enabled Supply-Chain Management
International Journal of Security and Networks
Context-aware web services for security control and privacy preservation in an RFID supply chain
International Journal of Information Technology and Management
Hi-index | 0.00 |
A radio-frequency identification (RFID) system has been gradually expending its application areas. However, RFID had a serious security problem like as attacker's tracing and spoofing. Especially, Low cost RFID tags are weak device and have limited computing power. Therefore, an RFID security protocol has been light weighted.In this paper, we design a lightweight RFID security protocol based on the ID Blind Scheme and ECC (Elliptic Curve Cryptography). Our protocol offers enhanced security feature in RFID security with respect to user privacy against tag cloning allowing an additional ECC modular operation.