We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Comparison of various Security Protocols in RFID

by Vaibhaw Dixit, Harsh K. Verma, Akhil K. Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 24 - Number 7
Year of Publication: 2011
Authors: Vaibhaw Dixit, Harsh K. Verma, Akhil K. Singh
10.5120/2951-3965

Vaibhaw Dixit, Harsh K. Verma, Akhil K. Singh . Comparison of various Security Protocols in RFID. International Journal of Computer Applications. 24, 7 ( June 2011), 17-21. DOI=10.5120/2951-3965

@article{ 10.5120/2951-3965,
author = { Vaibhaw Dixit, Harsh K. Verma, Akhil K. Singh },
title = { Comparison of various Security Protocols in RFID },
journal = { International Journal of Computer Applications },
issue_date = { June 2011 },
volume = { 24 },
number = { 7 },
month = { June },
year = { 2011 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume24/number7/2951-3965/ },
doi = { 10.5120/2951-3965 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:10:21.721227+05:30
%A Vaibhaw Dixit
%A Harsh K. Verma
%A Akhil K. Singh
%T Comparison of various Security Protocols in RFID
%J International Journal of Computer Applications
%@ 0975-8887
%V 24
%N 7
%P 17-21
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Paper presents a brief overview of RFID technology and protocols used in it. The paper becomes a foot step in analysis and contrasting Kill Tag, Hash-Lock, Enhanced Hash Lock, Selective Blocker Tag, Tag Broker Model and Molnar Wagner controlled delegation on the basis of security, implementation cost and practical implementation possibility. The discussion results in a selection of protocol as per the requirement and environment of use.

References
  1. Damith Ranasinghe, Daniel Engels, and Peter Cole. Low-cost rfid systems: Confronting security and privacy. In Auto-ID Labs Research Workshop, Zurich, Switzerland, September 2004.
  2. Jeongkyu Yang, Jaemin Park, Hyunrok Lee, Kui Ren, and Kwangjo Kim. Mutual authentication protocol for low-cost RFID. Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, July 2005.
  3. Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita. Cryptographic approach to privacy-friendly tags. In RFID Privacy Workshop, MIT, MA, USA, November 2003.
  4. G. Avoine, P.Oechslin, “RFID Tracebility: A Multilayer Problem”. In Financial Cryptography, 2005.
  5. Sokjooon Lee, Howon Kim and Kyoil Chung, “Tag Broker Model for Protecting Privacy in RFID Environment”. World Academy of Science, Engineering and Technology 10, 2005.
  6. Gildas Avoine. Cryptography in Radio Frequency Identi_cation and Fair Exchange Protocols. PhD thesis, EPFL, Lausanne, Switzerland, December 2005.
  7. Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In Marc Joye and Jean-Jacques Quisquater, editors, Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004, volume3156 of Lecture Notes in Computer Science, pages 357-370, Boston, Massachusetts, USA, August 2004. IACR, Springer-Verlag.
  8. David Molnar, Andrea Soppera, and David Wagner. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In Bart Preneel and Sta_ord Tavares, editors, Selected Areas in Cryptography - SAC 2005, Lecture Notes in Computer Science, Kingston, Canada, August 2005. Springer-Verlag.
  9. Gildas Avoine and Philippe Oechslin. A scalable and provably secure hash based RFID protocol. In International Workshop on Pervasive Computing and Communication Security - PerSec 2005, pages 110{114, Kauai Island, Hawaii, USA, March 2005. IEEE, IEEE Computer Society Press.
  10. MIT Auto-ID Center. http://www.autoidcenter.org, Feb 2004.
  11. Ari Juels. RFID security and privacy: A research survey. Manuscript, September 2005.
  12. A. Juels, R.L. Rivest, M. Szydlo. The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In v Atluri, editor 8th ACM Conference on Computer and Communications Security, paaes 103-111. ACM Press, 2003.
  13. S.A.Weis, S.E.Sarma, R.L. Revest, D.W. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems“ accepted for publication to the First International Conference on Security in Pervasive Computing (SPC 2003),March 12-14,2003.
Index Terms

Computer Science
Information Sciences

Keywords

RFID Kill Tag Hash-Lock Enhanced Hash Lock Selective Blocker Tag Tag Broker Model Molnar Wagner Controlled Delegation