- Volume 7 Issue 1
In this paper, we propose a general idea about an RFID system which provides lighted weight algorithm. We discuss how RFID could be applied for this kind of system, especially, compact protocol. We evaluate a few protocols that have been suggested for use in passive RFID tagged systems. We can reduce security computation without losing security features by message integration and pre-computation in this paper. And the proposed protocol can be used in low-cost RFID systems that require a small computational load for both the back-end database and the tags.
Authentication;RFID;Ubiquitous system;lighted weight algorithm
- H. Chan, etcs, "Security and Privacy in sensor networks," IEEE Computer, V.36, N.10, pp.103-105, Oct. 2003 https://doi.org/10.1109/MC.2003.1236475
- S. A. Weis, S. E. Sarma, R. Rivest, and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," in Proc. 1st Security Pervasive Comput., 2003, vol. 2802, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, pp. 201-212
- S. A. Weis, etcs, "Security and privacy aspects of low cost radion frequency identification systems", security in pervasive computing, 2003. (Journal Online Sources style) K. Author. (year,
- S. Sarma, S. Weis, D. Engels, "RFID systems and Security and privacy implications", in: Workshop on Cryptographic Hardware and Embedded Systems(CHES) 2002, LNCS No. 2523, 2003, pp. 454-469 https://doi.org/10.1007/3-540-36400-5_33
- P. Ekdahl, and T. Johansson, "Another attack on A5/1 ", IEEE Transactions on Information Theory, V.49, N.1, pp.284-289, 2003.Y. Yorozu, M. Hirano, K. aka, and Y. Tagawa https://doi.org/10.1109/TIT.2002.806129