Sciweavers

PERCOM
2008
ACM

Providing Security and Privacy in RFID Systems Using Triggered Hash Chains

13 years 4 months ago
Providing Security and Privacy in RFID Systems Using Triggered Hash Chains
RFID technology shall increase security, e.g. by helping to prevent counterfeiting. But the technology also causes privacy issues. In this paper, after highlighting goals and problems, an approach called "Triggered Hash Chains" is proposed to address the problems. The approach combines concepts of two very different, widely known RFID protocols, i.e. the "Hash-based ID variation" approach and the "Hash chain" approach. The resulting proposal joins the advantages of both protocols. The approach is evaluated using a variety of criteria that are relevant in practice.
Dirk Henrici, Paul Müller
Added 14 Dec 2010
Updated 14 Dec 2010
Type Journal
Year 2008
Where PERCOM
Authors Dirk Henrici, Paul Müller
Comments (0)