Hash-based RFID security protocol using randomly key-changed identification procedure

  • Authors:
  • Jia Zhai;Chang Mok Park;Gi-Nam Wang

  • Affiliations:
  • Industrial & Information Systems Engineering Department, Ajou University, Suwon, South Korea;Industrial & Information Systems Engineering Department, Ajou University, Suwon, South Korea;Industrial & Information Systems Engineering Department, Ajou University, Suwon, South Korea

  • Venue:
  • ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Radio Frequency Identification (RFID) is considered to be a promising identification approach in ubiquitous sensing technology. The operation of RFID systems in advanced applications may pose security and privacy risks to both organizations and individuals. In this paper, using randomly Key-Changed Identification, we propose an eavesdropping-proof security protocol based on cryptographic one way hash functions for passive RFID tags. Compared with several existing methods, our proposed protocol shows some security improvements as well as gives a reasonable and compatible approach that could be easily employed in practical situations. Finally, an illustration is also given to show clearly the whole operating procedure of the proposed procedure. Key Words: RFID (Radio Frequency Identification), Security Protocol, Hash Functions, Randomly Key-Changed Identification.