RFID Security Protocol Based On Cryptographic Hash Function

Trinity Journal of Management, IT & Media (TJMITM)
Year: 2017 (Jan-Dec), Volume: (8), Issue. (1)
First page: (68) Last page: (71)
Online ISSN: A/F
Print ISSN: 2320-6470
doi: 

RFID Security Protocol Based On Cryptographic Hash Function
Shiwangi upadhyay1

1Sr. Faculty, Mahan Institute of Tehnologies, New Delhi
Corresponding author email id:

Received:
16 -04-2017

Accepted:
14-06-2017

Online Published:
21-07-2017

How to cite the Article

This image has an empty alt attribute; its file name is images.png
View on Google Scholar

ABSTRACT

Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID consists of the tags, one or more readers, and a backend database. RFID Tags are tuned to a particular frequency, and each tag has a unique ID. The communication between RFID tag and Reader implements wireless communication, which is considered risky and easily attacked. RFID protocol conquers a forward privacy problem but presumed that communication channel between reader and database is
secure, which doesn’t agree with the real development of IOT. To conquer the privacy drawbacks of RFID protocol in mobile environment, an RFID security protocol based on the cryptographic hash function is design. This paper summarizes the problem about RFID security in the environment of IOT and suggests effective RFID security protocol based on cryptographic hash function. The suggested work will raise security to somewhat measure as well as denialof- service attack (DoS attack) and man-in-the-middle attack
(MITM attack), while hold on to a reasonable computation cost.

KEYWORDS

RFID protocol, RFID tag, forward privacy,cryptographic hash function, DoS attack, MITM, attack, IOT.