Hash-based Mutual Authentication Protocol for RFID Environment 


Vol. 35,  No. 1, pp. 42-52, Jan.  2010


PDF
  Abstract

Recently, Ahn et al proposed an improved authentication protocol using the hash function in RFID environment. Their proposed protocol provide the following three merits; it reduces the computational costs of RFID tag. itrfduces the communication overhead between the reader and the tag. it protects the user privacy. However, this paper points out that does not authenticate the legality of the RFID reader and database. this paper proposes an improved mutual authentication protocol that can provide the mutual authenticaion.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

D. Jeon, H. Kim, H. Kwon, S. Kim, "Hash-based Mutual Authentication Protocol for RFID Environment," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 1, pp. 42-52, 2010. DOI: .

[ACM Style]

Dong-ho Jeon, Hae-moon Kim, Hye-jin Kwon, and Soon-ja Kim. 2010. Hash-based Mutual Authentication Protocol for RFID Environment. The Journal of Korean Institute of Communications and Information Sciences, 35, 1, (2010), 42-52. DOI: .

[KICS Style]

Dong-ho Jeon, Hae-moon Kim, Hye-jin Kwon, Soon-ja Kim, "Hash-based Mutual Authentication Protocol for RFID Environment," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 1, pp. 42-52, 1. 2010.