Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System 


Vol. 34,  No. 4, pp. 428-434, Apr.  2009


PDF
  Abstract

Many RFID authentication protocols have been proposed to build a secure ubiquitous environment. However, existing protocols do not respond recent attacks appropriately and they perform many hash operations to authenticate a large number of tags. In this paper, we propose a hash function-based secure authentication protocol for improving efficiency in RFID system. The proposed protocol is safe to passive attacks and active attacks, and requires only 2 hash operations in a tag and 3 hash operations in a database. Accordingly, the proposed protocol is very effective in RFID system environment which is composed to low-cost tags and a database handling many tags.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

I. Kim, "Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System," The Journal of Korean Institute of Communications and Information Sciences, vol. 34, no. 4, pp. 428-434, 2009. DOI: .

[ACM Style]

Ik-Su Kim. 2009. Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System. The Journal of Korean Institute of Communications and Information Sciences, 34, 4, (2009), 428-434. DOI: .

[KICS Style]

Ik-Su Kim, "Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System," The Journal of Korean Institute of Communications and Information Sciences, vol. 34, no. 4, pp. 428-434, 4. 2009.