Abstract | ||
---|---|---|
A RFID system is a key technology used to create a ubiquitous society through non-contact radio identification technology, expected to provide us with information far above time and space. However, several security issues including a matter of privacy have been raised on account of restricted features of RFID communication environment. A variety of studies have been underway to bring solutions to them, but existing studies require excessive processing capabilities for security problems, tags and back-end database. To solve out this problem, this paper suggests mutual authentication RFID protocols that can guarantee safety from spoofing and re-transfer attack and also reduce the number of comparative operations in the back-end database, with the use of hash functions. XOR operation and key exchange. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1007/978-3-642-27180-9_30 | Communications in Computer and Information Science |
Keywords | Field | DocType |
RFID,Authentication,Key Exchange,Hash,XOR | SHA-2,Mutual authentication,Pass the hash,Challenge–response authentication,Computer security,Computer science,Cryptographic hash function,Hash function,Hash chain,Secure Hash Algorithm | Conference |
Volume | ISSN | Citations |
261 | 1865-0929 | 1 |
PageRank | References | Authors |
0.35 | 7 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Seung-Jae Jang | 1 | 6 | 1.66 |
Young-Hoon Jung | 2 | 3 | 1.21 |
So Yeon Min | 3 | 6 | 3.69 |
Keun-Wang Lee | 4 | 24 | 13.44 |
Moon-Seog Jun | 5 | 1 | 0.35 |