IJSTR

International Journal of Scientific & Technology Research

Home Contact Us
ARCHIVES
ISSN 2277-8616











 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

IJSTR >> Volume 3- Issue 4, April 2014 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Cryptographic Hash Based Security Protocol For Mobile Rfid - A Review

[Full Text]

 

AUTHOR(S)

Yogini Mankar, Pranali Suryawanshi

 

KEYWORDS

Keywords: RFID protocol, RFID tag, forward privacy, cryptographic hash function, security, IOT.

 

ABSTRACT

Abstract: In the RFID systems, privacy protection and integrity assurance become rather crucial, because these RFID tags may have a wide range of transmission, making them subject to unauthorized scanning by malicious readers and responsible for various other attacks. Da et als,RFID protocol overcome a forward privacy problem but assumed that communication channel between reader and database is secure, which doesn’t agree with the real development of IOT.Therefore, to overcome the privacy weaknesses of RFID protocol in mobile environment, an RFID security protocol based on the cryptographic hash function is design. The proposed work will increase security to certain extend as well as resistance to replay, denial-of-service and man-in-the-middle attacks, while retaining a competitive computation cost.

 

REFERENCES

[1]. Da-Zhi Sun and Ji-Dong Zhong “A Hash-Based RFID Security Protocol for Strong Privacy Protection” IEEE Transactions on Consumer Electronics, Vol. 58, November 2012.

[2]. Hyunsung Kim, “ RFID Mutual Authentication Protocol based on Synchronized Secret” International Journal of Security and Its Applications Vol. 7, No. 4, July, 2013

[3]. D’Arco and A. D. Santis, “On ultra lightweight RFID authentication protocols,” IEEE Transactions on Dependable and Secure Computing, vol. 8, Jul./Aug. 2011.

[4]. A.Juels, “RFID security and privacy: a research survey,” IEEE Journal on Selected Areas in Communications, vol. 24, May 2008.

[5]. A. Juels and S. A. Weis, “Defining strong privacy for RFID,” ACM Transactions on Information and System Security, vol. 13, Oct. 2009.

[6]. J. S. Cho, S. S. Yeo and S. K. Kim, “Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value”, IEEE Transactions on Computer Communications, vol. 34,May (2011).

[7]. Z. Lina, S. Chaoyi and F. Li, “Early warning of the propagation direction of network worms”, J. J. Huazhong Univ. of Sci. & Tech. (Natural Science Edition), (2009).

[8]. H. Gilbert, R. Matthew and H. Sibert, “An active attack against HB+: A provably secure lightweight authentication protocol”, IEEElectronics Letters, vol. 41, no. 21, (2005).

[9]. G. Avoine and P. Oechslin, “A scalable and provably secure hash-based RFID protocol”, Proceedings of the 2nd IEEE International Workshop on Pervasive Computing and Communication Security (PerSec 2010), Washington, DC, USA, (2010).

[10]. S.Piramuthu,“Lightweight cryptographic authentication in passive RFID-tagged systems,” IEEE Transactions on Systems, Man, and Cybernetics-Part Applications and Reviews, vol. 38, May 2008.