4.5 Article

A Hash-Based RFID Security Protocol for Strong Privacy Protection

Journal

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
Volume 58, Issue 4, Pages 1246-1252

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCE.2012.6414992

Keywords

RFID protocol; RFID tag; forward privacy; cryptographic hash function; security

Funding

  1. National Natural Science Foundation of China [61003306]
  2. Natural Science Foundation of Tianjin [11JCZDJC15800]
  3. Foundation of State Key Laboratory of Information Security (Institute of Information Engineering, Chinese Academy of Sciences, Beijing) [100093]

Ask authors/readers for more resources

RFID (Radio Frequency Identification) tags are small, wireless electronic devices that help identify objects and people. Privacy protection and integrity assurance become rather crucial in the RFID systems, because these RFID tags may have a wide transmission range, making them subject to unauthorized scanning by malicious readers and various other attacks. Hence, Ha et al. proposed an RFID protocol and proved that their protocol can provide the forward privacy service. However, in this paper, it is shown that an attacker can track a target tag by observing unsuccessful previous session of the tag. That is, Ha et al.'s RFID protocol fails to provide the forward privacy protection as claimed. Therefore, to overcome the privacy weaknesses of Ha et al.'s RFID protocol, an RFID protocol based on the cryptographic hash functions is proposed. Moreover, the proposed RFID protocol is evaluated according to both the privacy attribute and the implementation performance(1).

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available