Analyses of RFID System Using Lighted Weight Algorithm

  • Kim, Jung-Tae (Department of Electronic Eng., Mokwon University)
  • Published : 2009.03.30

Abstract

In this paper, we propose a general idea about an RFID system which provides lighted weight algorithm. We discuss how RFID could be applied for this kind of system, especially, compact protocol. We evaluate a few protocols that have been suggested for use in passive RFID tagged systems. We can reduce security computation without losing security features by message integration and pre-computation in this paper. And the proposed protocol can be used in low-cost RFID systems that require a small computational load for both the back-end database and the tags.

Keywords

References

  1. P. Ekdahl, and T. Johansson, "Another attack on A5/1 ", IEEE Transactions on Information Theory, V.49, N.1, pp.284-289, 2003.Y. Yorozu, M. Hirano, K. aka, and Y. Tagawa https://doi.org/10.1109/TIT.2002.806129
  2. S. A. Weis, etcs, "Security and privacy aspects of low cost radion frequency identification systems", security in pervasive computing, 2003. (Journal Online Sources style) K. Author. (year,
  3. H. Chan, etcs, "Security and Privacy in sensor networks," IEEE Computer, V.36, N.10, pp.103-105, Oct. 2003 https://doi.org/10.1109/MC.2003.1236475
  4. S. Sarma, S. Weis, D. Engels, "RFID systems and Security and privacy implications", in: Workshop on Cryptographic Hardware and Embedded Systems(CHES) 2002, LNCS No. 2523, 2003, pp. 454-469 https://doi.org/10.1007/3-540-36400-5_33
  5. S. A. Weis, S. E. Sarma, R. Rivest, and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," in Proc. 1st Security Pervasive Comput., 2003, vol. 2802, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, pp. 201-212