Skip to main content

Study on Security Analysis of RFID

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 297))

Abstract

This document is in the required format. The specialties and limitation of RFID system and device will incur lots of security problems especially when the system contains a lot of tags and many readers, the traditional methods become helpless. Here we present and analyze an improved hash key technique based on multiple readers.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhou, Y.-B., Feng, D.-G.: Design and Analysis of Cryptographic Protocols for RFID. J. Chinese Journal of Computers, 23–25 (2006)

    Google Scholar 

  2. Riebackmr, Crispo, B., Tanenbaum, A.S.: The evolution of RFID security. IEEE Pervasive Computing, 62–69 (2006)

    Google Scholar 

  3. Su, W., Cui, Z., Wang, X.-J.: Research on Hash chain-based RFID privacy enhancement tag. J. Computer Applications (10) (2006)

    Google Scholar 

  4. Thornton, F.: Syngress RFID Security. Syngress Publishing, Canada (2006)

    Google Scholar 

  5. Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes (2003)

    Google Scholar 

  6. Castelluccia, C., Avoine, G.: Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 289–299. Springer, Heidelberg (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Hou, Y., Ma, J. (2014). Study on Security Analysis of RFID. In: Pan, JS., Snasel, V., Corchado, E., Abraham, A., Wang, SL. (eds) Intelligent Data analysis and its Applications, Volume I. Advances in Intelligent Systems and Computing, vol 297. Springer, Cham. https://doi.org/10.1007/978-3-319-07776-5_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07776-5_19

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07775-8

  • Online ISBN: 978-3-319-07776-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics