2012
DOI: 10.4028/www.scientific.net/amr.562-564.1583
|View full text |Cite
|
Sign up to set email alerts
|

An Improvement on Randomly Changed Identification Protocol for Low-Cost Tags

Abstract: With the benefits to improve productivity and reduce operation cost, RFID (Radio Frequency Identification) has recently seen a great increase in a wide variety of business information systems. However, the downside in business applications is the problem caused by data security and privacy. Enhancement without extra costs in RFID identification poses new challenges to privacy and security in RFID-driven just-in-time business information systems. In this paper, we propose an unilateral randomly authentication p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Hash chain method is used in this two ways communication of RFID tag. This work was adopted in [30] by enhancing unilateral randomly authentication protocol using oneway hash function. Even though the protocol does not require a random number generator, it seems satisfy data protection of RFID tags as well as provides adequate tracking prevention.…”
Section: Hash Chain-based Schemementioning
confidence: 99%
“…Hash chain method is used in this two ways communication of RFID tag. This work was adopted in [30] by enhancing unilateral randomly authentication protocol using oneway hash function. Even though the protocol does not require a random number generator, it seems satisfy data protection of RFID tags as well as provides adequate tracking prevention.…”
Section: Hash Chain-based Schemementioning
confidence: 99%