The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2011 vol.13)
pp: 20-24
Chia-Hui Wei , Comput. Sci., Nat. Tsing Hua Univ., Hsinchu, Taiwan
Min-Shiang Hwang , Dept. of Comput. Sci. & Inf. Eng., Asia Univ., Taichung, Taiwan
A Y Chin , Dept. of Comput. Sci., Nat. Tsing Hua Univ., Hsinchu, Taiwan
ABSTRACT
Designing a security protocol for RFID systems is difficult because RFID tags have limited power-consumption and memory capabilities. A mutual authentication protocol based on a hash function helps prevent attacks against RFID systems.
INDEX TERMS
telecommunication security, cryptographic protocols, radiofrequency identification, encryption methods, authentication protocol, security protocol, RFID systems, RFID tags, power-consumption, Databases, Radiofrequency identification, Protocols, Authentication, Privacy, Network security, information technology, Hash function, privacy, RFID, and security
CITATION
Chia-Hui Wei, Min-Shiang Hwang, A Y Chin, "A Mutual Authentication Protocol for RFID", IT Professional, vol.13, no. 2, pp. 20-24, March/April 2011, doi:10.1109/MITP.2011.17
REFERENCES
1. T. Cao and P. Shen, "Cryptanalysis of Two RFID Authentication Protocols," Int'l J. Network Security, vol. 9, no. 1, 2009, pp. 95–100.
2. C.-L. Chen et al., "RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards," Int'l J. Network Security, vol. 13, no. 1, 2011, pp. 41–48.
3. X. Zhang and B. King, "Security Requirements for RFID Computing Systems," Int'l J. Network Security, vol. 6, no. 2, 2008, pp. 214–226.
4. D.N. Duc et al., "Enhancing Security of EPC Global GEN-2 RFID Tag against Tractability and Cloning," Proc. 2006 Symp. Cryptography and Information Security (SCIS 06), Springer, 2006, pp. 17–20.
5. S.E. Sarma, S.A. Weis, and D.W. Engels, "RFID Systems and Security and Privacy Implications," Proc. 2007 Int'l Conf. Computational Science and Its Applications, LNCS 2523, Springer, 2002, pp. 454–469.
6. S.E. Sarma, S.A. Weis, and D.W. Engels, "Radio Frequency Identification Security Risks and Challenges," CryptoBytes, vol. 6, no. 1, 2003, pp. 1–9.
7. R. Juels, L. Rivest, and M. Szydlo, "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy," Proc. 10th ACM Conf. Computer and Communications Security, ACM Press, 2003, pp. 103–111.
8. L. Lamport, "Password Authentication with Insecure Communication," Comm. ACM, Nov. 1981, pp. 770–772.
9. N.C. Wu et al., "Challenges to Global RFID Adoption," Technovation, vol. 6, no. 12, 2007, pp. 257–278.
10. H.-Y. Chien et al., "Two RFID-based Solutions to Enhance Inpatient Medication Safety," J. Medical Systems, Sep. 2009; www.springerlink.com/contentx2n7x062637g6k74 /.
11. M.S. Hwang, C.H. Wei, and C.Y. Lee, "Privacy and Security Requirements for RFID Applications," J. Computers, vol. 20, no. 3, 2009, pp. 55–60.
12. N. Lehlou, "An Online RFID Laboratory Learning Environment," IEEE Trans. Learning Technologies, vol. 2, no. 4, 2009, pp. 295–303.
13. M. Tajima, "Strategic Value of RFID in Supply Chain Management," J. Purchasing and Supply Management, vol. 13, no. 4, 2007, pp. 261–273.
14. J.J. Roh, A. Kunnathur, and M. Tarafdar, "Classification of RFID Adoption: An Expected Benefits Approach," Information & Management, vol. 46, no. 6, 2009, pp. 357–363.
15. Y.-J. Tu, W. Zhou, and S. Piramuthu, "Identifying RFID Embedded Objects in Pervasive Healthcare Applications," Decision Support Systems, vol. 46, no. 2, 2009, pp. 586–593.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool