RFID Tag's Security Level Based RFID Authentication Protocol 


Vol. 30,  No. 6, pp. 593-600, Jun.  2005


PDF
  Abstract

Recently, RFID system is a main technology to realize ubiquitous computing environments. Because RFID system that is an automatic identification technology using radio frequency is a system to read and write the data of the entity. Therefore, many companies are interested in RFID system to reduce supply chain management and inventory control cost. However, for providing secure service, RFID authentication technology secure against tracking by an adversary is researched first. In this paper, we proposed security level based RFID authentication protocol providing reduce computational and communicational workload in the back-end database. The proposed protocol is secure against reply attack, spoofing attack, traffic analysis, and location privacy, since the proposed protocol based on the security of the hash function.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

S. Oh and J. kwak, "RFID Tag's Security Level Based RFID Authentication Protocol," The Journal of Korean Institute of Communications and Information Sciences, vol. 30, no. 6, pp. 593-600, 2005. DOI: .

[ACM Style]

Soo-hyun Oh and Jin kwak. 2005. RFID Tag's Security Level Based RFID Authentication Protocol. The Journal of Korean Institute of Communications and Information Sciences, 30, 6, (2005), 593-600. DOI: .

[KICS Style]

Soo-hyun Oh and Jin kwak, "RFID Tag's Security Level Based RFID Authentication Protocol," The Journal of Korean Institute of Communications and Information Sciences, vol. 30, no. 6, pp. 593-600, 6. 2005.