Cryptographic Hash Based Security Protocol for Mobile RFID - A Review

Download Now
Provided by: International Journal of Scientific & Technology Research
Topic: Mobility
Format: PDF
In the RFID systems, privacy protection and integrity assurance become rather crucial, because these RFID tags may have a wide range of transmission, making them subject to unauthorized scanning by malicious readers and responsible for various other attacks. The researchers RFID protocol overcome a forward privacy problem but assumed that communication channel between reader and database is secure, which doesn't agree with the real development of IOT. Therefore, to overcome the privacy weaknesses of RFID protocol in mobile environment, an RFID security protocol based on the cryptographic hash function is design.
Download Now

Find By Topic