Back to Search Start Over

A survey of RFID authentication protocols based on hash-chain method

Authors :
G. Dhillon
J. Lee
F. Ko
Syamsuddin, I
Dillon, Tharam S.
Chang, Elizabeth
Han, Song
G. Dhillon
J. Lee
F. Ko
Syamsuddin, I
Dillon, Tharam S.
Chang, Elizabeth
Han, Song
Publication Year :
2008

Abstract

Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations.

Details

Database :
OAIster
Publication Type :
Electronic Resource
Accession number :
edsoai.on1033945408
Document Type :
Electronic Resource