RFID Security Protocol Based On Cryptographic Hash Function

Trinity Journal of Management, IT & Media (TJMITM)
Year: 2017 (Jan-Dec), Volume: (8), Issue. (1)
First page: (68) Last page: (71)
Online ISSN: A/F
Print ISSN: 2320-6470

RFID Security Protocol Based On Cryptographic Hash Function
Shiwangi upadhyay1

1Sr. Faculty, Mahan Institute of Tehnologies, New Delhi
Corresponding author email id:

16 -04-2017


Online Published:

How to cite the Article

This image has an empty alt attribute; its file name is images.png
View on Google Scholar


Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID consists of the tags, one or more readers, and a backend database. RFID Tags are tuned to a particular frequency, and each tag has a unique ID. The communication between RFID tag and Reader implements wireless communication, which is considered risky and easily attacked. RFID protocol conquers a forward privacy problem but presumed that communication channel between reader and database is
secure, which doesn’t agree with the real development of IOT. To conquer the privacy drawbacks of RFID protocol in mobile environment, an RFID security protocol based on the cryptographic hash function is design. This paper summarizes the problem about RFID security in the environment of IOT and suggests effective RFID security protocol based on cryptographic hash function. The suggested work will raise security to somewhat measure as well as denialof- service attack (DoS attack) and man-in-the-middle attack
(MITM attack), while hold on to a reasonable computation cost.


RFID protocol, RFID tag, forward privacy,cryptographic hash function, DoS attack, MITM, attack, IOT.