RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
An Approach to Security and Privacy of RFID System for Supply Chain
CEC-EAST '04 Proceedings of the E-Commerce Technology for Dynamic E-Business, IEEE International Conference
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
An Analysis of RFID Tag Authentication Protocols Using Secret Value
FGCN '07 Proceedings of the Future Generation Communication and Networking - Volume 01
A Survey of RFID Authentication Protocols Based on Hash-Chain Method
ICCIT '08 Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology - Volume 02
An Improvement on RFID Authentication Protocol with Privacy Protection
ICCIT '08 Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology - Volume 02
A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Scalable and flexible privacy protection scheme for RFID systems
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Addressing flaws in RFID authentication protocols
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
A minimum disclosure approach to authentication and privacy in RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy protection for low-cost RFID tags in IoT systems
Proceedings of the 7th International Conference on Future Internet Technologies
Concurrency and Computation: Practice & Experience
Critical Evaluation of RFID Security Protocols
International Journal of Information Security and Privacy
Hardware implementation of tag-reader mutual authentication protocol for RFID systems
Integration, the VLSI Journal
On the security of RFID anti-counting security protocol (ACSP)
Journal of Computational and Applied Mathematics
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol
Journal of Computational and Applied Mathematics
Improvement of the Hash-Based RFID Mutual Authentication Protocol
Wireless Personal Communications: An International Journal
Hi-index | 0.25 |
Radio Frequency IDentification (RFID ) system is a contactless automatic identification system using small, low-cost RFID tags. It enables recognition of the tag information via radio frequency communication, by attaching an RFID tag to an animate or inanimate object. Since an RFID system has the advantage of simultaneously recognizing massive amounts of information, it is expected to replace the bar-code system. The most important problem with an RFID system is that an adversary can access the tag information, which gives rise to privacy and forgery problems. This paper presents a hash-based mutual authentication protocol as a solution. The proposed protocol is designed to send a random number generated by a tag to a back-end server without disclosure. Moreover it substitutes a random number with a secret value, which is employed in a response message. The properties of the proposed protocol enable constant creation of distinct response messages without interferences from intended or meaningless requests generated by an adversary, while the secret value is not directly transmitted. Our proposed protocol make is difficult for an attacker to launch successful brute-force attacks against our approach.