We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Enhanced Hash Chain based Scheme for Security and Privacy in RFID Systems

by Vaibhaw Dixit, Harsh K. Verma, Akhil K. Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 28 - Number 9
Year of Publication: 2011
Authors: Vaibhaw Dixit, Harsh K. Verma, Akhil K. Singh
10.5120/3415-4765

Vaibhaw Dixit, Harsh K. Verma, Akhil K. Singh . Enhanced Hash Chain based Scheme for Security and Privacy in RFID Systems. International Journal of Computer Applications. 28, 9 ( August 2011), 26-30. DOI=10.5120/3415-4765

@article{ 10.5120/3415-4765,
author = { Vaibhaw Dixit, Harsh K. Verma, Akhil K. Singh },
title = { Enhanced Hash Chain based Scheme for Security and Privacy in RFID Systems },
journal = { International Journal of Computer Applications },
issue_date = { August 2011 },
volume = { 28 },
number = { 9 },
month = { August },
year = { 2011 },
issn = { 0975-8887 },
pages = { 26-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume28/number9/3415-4765/ },
doi = { 10.5120/3415-4765 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:14:20.856626+05:30
%A Vaibhaw Dixit
%A Harsh K. Verma
%A Akhil K. Singh
%T Enhanced Hash Chain based Scheme for Security and Privacy in RFID Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 28
%N 9
%P 26-30
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The research Paper describes security and privacy issues in RFID systems and proposes a new enhanced algorithm. Our proposed protocol is an enhancement over Sang-Soo Yeo and Sung Kwon Kim’ protocol and it provides better security and privacy. Comparative analysis of our proposed protocol and Yeo et al. protocol is done on the basis of various parameters like number of tags, length of hash chain, number of groups etc. The simulation is done using Sun Microsystems Java and results are analyzed using visual inspection.

References
  1. Damith Ranasinghe, Daniel Engels, and Peter Cole. Low-cost rfid systems: Confronting security and privacy. In Auto-ID Labs Research Workshop, Zurich, Switzerland, September 2004.
  2. Jeongkyu Yang, Jaemin Park, Hyunrok Lee, Kui Ren, and Kwangjo Kim. Mutual authentication protocol for low-cost RFID. Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, July 2005.
  3. M. Ohkubo, K. Suzuki, and S. Kinoshita, “Cryptographic Approach to “Privacy-Friendly” Tags”. RFID Privacy Workshop, MIT, November 2003 J. Breckling, Ed., The Analysis of Directional Time Series: Applications to Wind Speed and Direction, ser. Lecture Notes in Statistics. Berlin, Germany: Springer, 1989, vol. 61.
  4. S. Sarma, S. Weis, and D. Engels, “RFID Systems and Security and Privacy Implications”,CHES 2002, vol. 2523 of LNCS, pp. 454-469, August 2002.
  5. G. Avoine, P.Oechslin, “RFID Tracebility: A Multilayer Problem”. In Financial Cryptography, 2005.
  6. M. Ohkubo, K. Suzuki and S. Kinoshita, “Efficient Hash-Chain Based RFID Privacy Protection Scheme”, Ubicomp 2004, 2004.
  7. Boyeon Song , Chris J. Mitchell,”Scalable RFID Pseudonym Protocol”Third International Conference on Network and System Security 2009.
  8. P. Golle, M. Jakobsson, A. Juels, and P. Syverson, “Universal Re-Encryption for Mixnets”, CT-RSA ’04, 2004
  9. J. Saito, J-C. Ryou and K. Sakurai, “Enhancing Privacy of Universal Re-Encryption Scheme for RFID Tags”, EUC ’04, pp. 879-890, August 2004
  10. Nai-Wei Lo, Kuo-Hui Yeh,” Mutual RFID Authentication Scheme for Resource-constrained Tags”,In Journal of Information Science and Engineering-IJSE vol. 26, no. 5, pp. 1875-1889, 2010
  11. G. Avoine and P. Oechslin. “A Scalable and Provably Secure Hash-Based RFID Protocol”, IEEE PerSec 2005, Kauai island, Hawaii, USA, March 8th, 2005.
  12. Sang-Soo Yeo and Sung-Kwon Kim. Scalable and flexible privacy protection scheme for RFID systems. In Refik Molva, Gene Tsudik, and Dirk Westhof_, editors, European Workshop on Security and Privacy in Ad hoc and Sensor Networks ESAS'05, volume 3813 of Bibliography Lecture Notes in Computer Science, pages 153-163, Visegrad, Hungary, July 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Security Privacy Hash Chain Hash function RFID