Title :
Providing Security and Privacy in RFID Systems Using Triggered Hash Chains
Author :
Henrici, Dirk ; Muller, Philipp
Author_Institution :
Univ. of Kaiserslautern, Kaiserslautern
Abstract :
RFID technology shall increase security, e.g. by helping to prevent counterfeiting. But the technology also causes privacy issues. In this paper, after highlighting goals and problems, an approach called "triggered hash chains" is proposed to address the problems. The approach combines concepts of two very different, widely known RFID protocols, i.e. the "hash-based ID variation" approach and the "Hash chain" approach. The resulting proposal joins the advantages of both protocols. The approach is evaluated using a variety of criteria that are relevant in practice.
Keywords :
cryptographic protocols; radiofrequency identification; telecommunication security; RFID protocol; RFID system; data privacy; hash-based ID variation; triggered hash chain; Communication system security; Computer crime; Counterfeiting; Data security; Pervasive computing; Privacy; Proposals; Protocols; RFID tags; Radiofrequency identification; Hash Functions; Pervasive Computing; Privacy; RFID; Security; Ubiquitous Computing;
Conference_Titel :
Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE International Conference on
Conference_Location :
Hong Kong
Print_ISBN :
978-0-7695-3113-7
DOI :
10.1109/PERCOM.2008.67