A Survey of Authentication of RFID Devices Using Hash Function

Authors

  • Suthar Monali  IT Department, LDCE, Ahmedabad, Gujarat, India
  • Alka J Patel  IT Department, LDCE, Ahmedabad, Gujarat, India

Keywords:

RFID, Reader, Tag, Backend Sever , Authentication , Security , HASH, HMAC.

Abstract

RFID is a wireless technology for automatic identification and data capture . RFID is the core technology to implement the internet of things. So the security issue of RFID is becoming more and more important, in the past decade, a large number of research papers dealing with security issues of RFID technology have appeared [1]. The problem of authentication and privacy are fundamental to RFID devices. In this paper we discuss security attack possible on RFID and three different authentication algorithm of RFID.

References

  1. Xiao Nie, Xiong Zhong “Security In the Internet of Things Based on RFID: Issues and  Current Countermeasures” Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013), Published by Atlantis Press, Paris, France.
  2. Seung Wook Jung , Souhwan Jung ” HRP : A HMAC-based RFID mutual authentication protocol using PUF” , ICOIN 2013, IEEE publication , pp 578-582.
  3. Boyeon Song , Chris J Mitchell ” RFID AuthenticationProtocolfor Low-cost Tags” WiSec’08, March 31–April 2,2008,Alexandria, Virginia, USA.

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
Suthar Monali, Alka J Patel, " A Survey of Authentication of RFID Devices Using Hash Function, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 6, pp.589-592, September-October-2017.