A Survey of Authentication of RFID Devices Using Hash Function
Keywords:
RFID, Reader, Tag, Backend Sever , Authentication , Security , HASH, HMAC.Abstract
RFID is a wireless technology for automatic identification and data capture . RFID is the core technology to implement the internet of things. So the security issue of RFID is becoming more and more important, in the past decade, a large number of research papers dealing with security issues of RFID technology have appeared [1]. The problem of authentication and privacy are fundamental to RFID devices. In this paper we discuss security attack possible on RFID and three different authentication algorithm of RFID.
References
- Xiao Nie, Xiong Zhong “Security In the Internet of Things Based on RFID: Issues and Current Countermeasures” Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013), Published by Atlantis Press, Paris, France.
- Seung Wook Jung , Souhwan Jung ” HRP : A HMAC-based RFID mutual authentication protocol using PUF” , ICOIN 2013, IEEE publication , pp 578-582.
- Boyeon Song , Chris J Mitchell ” RFID AuthenticationProtocolfor Low-cost Tags” WiSec’08, March 31–April 2,2008,Alexandria, Virginia, USA.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.