A survey of RFID authentication protocols based on hash-chain method

Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific...

Full description

Bibliographic Details
Main Authors: Syamsuddin, I, Dillon, Tharam S., Chang, Elizabeth, Han, Song
Other Authors: G. Dhillon
Format: Conference Paper
Published: Institute of Electrical and Electronics Engineers (IEEE) Computer Society 2008
Subjects:
Online Access:http://hdl.handle.net/20.500.11937/8607
_version_ 1848745707424448512
author Syamsuddin, I
Dillon, Tharam S.
Chang, Elizabeth
Han, Song
author2 G. Dhillon
author_facet G. Dhillon
Syamsuddin, I
Dillon, Tharam S.
Chang, Elizabeth
Han, Song
author_sort Syamsuddin, I
building Curtin Institutional Repository
collection Online Access
description Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations.
first_indexed 2025-11-14T06:21:38Z
format Conference Paper
id curtin-20.500.11937-8607
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T06:21:38Z
publishDate 2008
publisher Institute of Electrical and Electronics Engineers (IEEE) Computer Society
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-86072022-11-21T05:19:40Z A survey of RFID authentication protocols based on hash-chain method Syamsuddin, I Dillon, Tharam S. Chang, Elizabeth Han, Song G. Dhillon J. Lee F. Ko RFID hash chain privacy security Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations. 2008 Conference Paper http://hdl.handle.net/20.500.11937/8607 10.1109/ICCIT.2008.314 Institute of Electrical and Electronics Engineers (IEEE) Computer Society fulltext
spellingShingle RFID
hash chain
privacy
security
Syamsuddin, I
Dillon, Tharam S.
Chang, Elizabeth
Han, Song
A survey of RFID authentication protocols based on hash-chain method
title A survey of RFID authentication protocols based on hash-chain method
title_full A survey of RFID authentication protocols based on hash-chain method
title_fullStr A survey of RFID authentication protocols based on hash-chain method
title_full_unstemmed A survey of RFID authentication protocols based on hash-chain method
title_short A survey of RFID authentication protocols based on hash-chain method
title_sort survey of rfid authentication protocols based on hash-chain method
topic RFID
hash chain
privacy
security
url http://hdl.handle.net/20.500.11937/8607