RFID Mutual Authentication Protocol Using Nonfixed Symmetric Key Based on Shift Computation and Random Number 


Vol. 37,  No. 5, pp. 377-384, May  2012


PDF
  Abstract

RFID system is a technique to obtain information of tag using radio frequency. Specificity of RFID systems using radio frequency has many problems that is eavesdropping, location tracking, spoofing attack, replay attack, denial of service attack. So, RFID protocol should be used cryptographic methods and mutual authentication for security and privacy. In this paper, we explain the problem of past protocol and propose the nonfixed symmetric key-based RFID mutual authentication protocol using shift computation and random number. Proposed protocol is secure from various attacks. Because it use shift operation and non-fixed symmetric key.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

J. Lee, S. Oh, K. Chung, C. Lee, K. Ahn, "RFID Mutual Authentication Protocol Using Nonfixed Symmetric Key Based on Shift Computation and Random Number," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 5, pp. 377-384, 2012. DOI: .

[ACM Style]

Jaekang Lee, Sejin Oh, Kyungho Chung, Changhee Lee, and Kwangseon Ahn. 2012. RFID Mutual Authentication Protocol Using Nonfixed Symmetric Key Based on Shift Computation and Random Number. The Journal of Korean Institute of Communications and Information Sciences, 37, 5, (2012), 377-384. DOI: .

[KICS Style]

Jaekang Lee, Sejin Oh, Kyungho Chung, Changhee Lee, Kwangseon Ahn, "RFID Mutual Authentication Protocol Using Nonfixed Symmetric Key Based on Shift Computation and Random Number," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 5, pp. 377-384, 5. 2012.