An Efficient and Secure RFID Security Method with Ownership Transfer
- 1 November 2006
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 2005, 1090-1095
- https://doi.org/10.1109/iccias.2006.295430
Abstract
Radio frequency identification (RFID) has come under the spotlight as technology supporting ubiquitous society. But now, we face several security problems and challenges in RFID systems. Recent papers have reported that RFID systems have to achieve the following requirements: (1) indistinguishability; (2) forward security; (3) replay attack; (4) tag killing; and (5) ownership transfer. We have to design RFID system that achieves the above-mentioned requirements. The previous methods achieve only some of them individually, and no RFID system has been constructed that achieves all requirements. In this paper, we propose an RFID security method that achieves all requirements based on a hash function and a symmetric key cryptosystem. In addition, our proposed method provides not only high-security but also high-efficiencyKeywords
This publication has 3 references indexed in Scilit:
- Quantitative evaluation of unlinkable ID matching schemesPublished by Association for Computing Machinery (ACM) ,2005
- RFID System with Fairness Within the Framework of Security and PrivacyLecture Notes in Computer Science, 2005
- Privacy and security in library RFIDPublished by Association for Computing Machinery (ACM) ,2004