Title
RFID Mutual Authentication Protocols Using Key Exchange Based on Hash Functions.
Abstract
A RFID system is a key technology used to create a ubiquitous society through non-contact radio identification technology, expected to provide us with information far above time and space. However, several security issues including a matter of privacy have been raised on account of restricted features of RFID communication environment. A variety of studies have been underway to bring solutions to them, but existing studies require excessive processing capabilities for security problems, tags and back-end database. To solve out this problem, this paper suggests mutual authentication RFID protocols that can guarantee safety from spoofing and re-transfer attack and also reduce the number of comparative operations in the back-end database, with the use of hash functions. XOR operation and key exchange.
Year
DOI
Venue
2011
10.1007/978-3-642-27180-9_30
Communications in Computer and Information Science
Keywords
Field
DocType
RFID,Authentication,Key Exchange,Hash,XOR
SHA-2,Mutual authentication,Pass the hash,Challenge–response authentication,Computer security,Computer science,Cryptographic hash function,Hash function,Hash chain,Secure Hash Algorithm
Conference
Volume
ISSN
Citations 
261
1865-0929
1
PageRank 
References 
Authors
0.35
7
5
Name
Order
Citations
PageRank
Seung-Jae Jang161.66
Young-Hoon Jung231.21
So Yeon Min363.69
Keun-Wang Lee42413.44
Moon-Seog Jun510.35