The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (2011 vol. 13)
ISSN: 1520-9202
pp: 20-24
Chia-Hui Wei , Comput. Sci., Nat. Tsing Hua Univ., Hsinchu, Taiwan
Min-Shiang Hwang , Dept. of Comput. Sci. & Inf. Eng., Asia Univ., Taichung, Taiwan
A Y Chin , Dept. of Comput. Sci., Nat. Tsing Hua Univ., Hsinchu, Taiwan
Designing a security protocol for RFID systems is difficult because RFID tags have limited power-consumption and memory capabilities. A mutual authentication protocol based on a hash function helps prevent attacks against RFID systems.
telecommunication security, cryptographic protocols, radiofrequency identification, encryption methods, authentication protocol, security protocol, RFID systems, RFID tags, power-consumption, Databases, Radiofrequency identification, Protocols, Authentication, Privacy, Network security, information technology, Hash function, privacy, RFID, and security
Chia-Hui Wei, Min-Shiang Hwang, A Y Chin, "A Mutual Authentication Protocol for RFID", IT Professional, vol. 13, no. , pp. 20-24, March/April 2011, doi:10.1109/MITP.2011.17
83 ms
(Ver 3.3 (11022016))