A survey of RFID authentication protocols based on hash-chain method
Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific...
| Main Authors: | , , , |
|---|---|
| Other Authors: | |
| Format: | Conference Paper |
| Published: |
Institute of Electrical and Electronics Engineers (IEEE) Computer Society
2008
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/8607 |
| _version_ | 1848745707424448512 |
|---|---|
| author | Syamsuddin, I Dillon, Tharam S. Chang, Elizabeth Han, Song |
| author2 | G. Dhillon |
| author_facet | G. Dhillon Syamsuddin, I Dillon, Tharam S. Chang, Elizabeth Han, Song |
| author_sort | Syamsuddin, I |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations. |
| first_indexed | 2025-11-14T06:21:38Z |
| format | Conference Paper |
| id | curtin-20.500.11937-8607 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T06:21:38Z |
| publishDate | 2008 |
| publisher | Institute of Electrical and Electronics Engineers (IEEE) Computer Society |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-86072022-11-21T05:19:40Z A survey of RFID authentication protocols based on hash-chain method Syamsuddin, I Dillon, Tharam S. Chang, Elizabeth Han, Song G. Dhillon J. Lee F. Ko RFID hash chain privacy security Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations. 2008 Conference Paper http://hdl.handle.net/20.500.11937/8607 10.1109/ICCIT.2008.314 Institute of Electrical and Electronics Engineers (IEEE) Computer Society fulltext |
| spellingShingle | RFID hash chain privacy security Syamsuddin, I Dillon, Tharam S. Chang, Elizabeth Han, Song A survey of RFID authentication protocols based on hash-chain method |
| title | A survey of RFID authentication protocols based on hash-chain method |
| title_full | A survey of RFID authentication protocols based on hash-chain method |
| title_fullStr | A survey of RFID authentication protocols based on hash-chain method |
| title_full_unstemmed | A survey of RFID authentication protocols based on hash-chain method |
| title_short | A survey of RFID authentication protocols based on hash-chain method |
| title_sort | survey of rfid authentication protocols based on hash-chain method |
| topic | RFID hash chain privacy security |
| url | http://hdl.handle.net/20.500.11937/8607 |