earticle

논문검색

Secure Hash-based Search Protocols for RFID Systems

초록

영어

When RFID systems become pervasive in our life, tag search becomes crucial. However, the problem of RFID search has not been widely addressed in the literature. RFID search protocol which is used to find specific tags has many applications such as inventory management, supply chain management. In this paper, we propose a set of secure and private Hash-based RFID search protocols that can meet all known major attacks in RFID systems, and especially it can protect the privacy of mobile reader users.

목차

Abstract
 1. Introduction
 2. A RFID search protocol based on static ID scheme
  2.1. Notation
  2.2. Assumptions
  2.3. The (i +1)th Authentication Access
  2.4. The Corresponding Search Protocol of this Authentication Protocol
  2.5. Security Analysis of this Search Protocol
 3. A RFID Search Protocol based on Dynamic ID Scheme for Fixed Reader
  3.1. Notation
  3.2 The (i +1)th authentication access
  3.3. The Corresponding Search Protocol of this Authentication Protocol
  3.4. Security Analysis of this Search Protocol
 4. A RFID Search Protocol based on Dynamic ID Scheme for Mobile Reader
  4.1. Assumptions
  4.2. The Execution Access of the Proposed Search Protocol
  4.3. Security Analysis of this Search Protocol
 5. Conclusion
 Acknowledgements
 References

저자정보

  • He Jialiang College of Information and Communication Engineering, Dalian Nationalities University, China
  • Xu Zhiqiang Department of digital media technology, Sichuan College of Media and Communications, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.