CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
RFID: A Guide to Radio Frequency Identification
RFID: A Guide to Radio Frequency Identification
IEEE Transactions on Dependable and Secure Computing
EMAP: an efficient mutual-authentication protocol for low-cost RFID tags
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Hi-index | 0.00 |
Radio frequency identification (RFID) is a technology with a great potential in many industries and a wide spectrum of possible uses. However, it is very much vulnerable as it faces some major security challenges and threats. There currently exist several RFID technologies without proper security enhancement such as privacy and authentication. Thus, this paper addresses security, privacy and authentication and proposes a lightweight mutual authentication suitable to be implemented for the passive RFID tags. The proposed protocol is simple, low cost and low power consumption as well as requires low computation as it uses a light shrinking generator that could be considered an alternative for the use of the well known one time pad algorithm.