Abstract:With the benefits to improve productivity and reduce operation cost, RFID (Radio Frequency Identification) has recently seen a great increase in a wide variety of business information systems. However, the downside in business applications is the problem caused by data security and privacy. Enhancement without extra costs in RFID identification poses new challenges to privacy and security in RFID-driven just-in-time business information systems. In this paper, we propose an unilateral randomly authentication p… Show more
“…Hash chain method is used in this two ways communication of RFID tag. This work was adopted in [30] by enhancing unilateral randomly authentication protocol using oneway hash function. Even though the protocol does not require a random number generator, it seems satisfy data protection of RFID tags as well as provides adequate tracking prevention.…”
Index terms: RFID, vehicle plate license, smart identification, security and privacy, low cost, data protection, tracking prevention, and forward security.
“…Hash chain method is used in this two ways communication of RFID tag. This work was adopted in [30] by enhancing unilateral randomly authentication protocol using oneway hash function. Even though the protocol does not require a random number generator, it seems satisfy data protection of RFID tags as well as provides adequate tracking prevention.…”
Index terms: RFID, vehicle plate license, smart identification, security and privacy, low cost, data protection, tracking prevention, and forward security.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.