http://iet.metastore.ingenta.com
1887

RFID privacy and authentication protocols

RFID privacy and authentication protocols

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
RFID Protocol Design, Optimization, and Security for the Internet of Things — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

RFID is a promising technology that can revolutionize the way we lead our lives. However, before this becomes a reality, certain security issues like consumer privacy protection and fraud prevention and detection must be addressed. This chapter covers only a minimum amount of protocols used within RFID technology to establish the current security that protects this field. Before RFID officially overtakes the use of barcodes, extensive research must continue to ensure an efficient speed and protection of the individual tags. However, it still is believed that not every system using passive RFID tags will encase the same approach, but rather a number of security protocols will become the standard by EPC regulations for each separate RFID system. There is an ample scope in the field of RFID security to improve and innovate in order to allow RFID technology to be incorporated into our daily lives.

Chapter Contents:

  • 9.1 Introduction
  • 9.2 Premier RFID authentication and privacy protocols
  • 9.2.1 Tag "killing" protocols
  • 9.2.2 Cryptography protocols
  • 9.3 RFID privacy devices
  • 9.3.1 Faraday's cage
  • 9.3.2 Active jamming device
  • 9.3.3 Blocker tag
  • 9.4 RFID protocols based on hash functions
  • 9.4.1 Hash lock: the original hash function-based approach
  • 9.4.2 Tree-based approaches
  • 9.4.3 HashTree: a dynamic key-updating approach
  • 9.5 Other RFID authentication and privacy protocols
  • 9.5.1 Minimalist cryptography
  • 9.5.2 RFIDGuard: an authentication and privacy protocol designed for passive RFID tags
  • 9.6 Conclusion

Inspec keywords: cryptographic protocols; telecommunication security; data privacy; radiofrequency identification

Other keywords: RFID technology; security protocols; fraud prevention; barcodes; authentication protocols; EPC regulation; tag protection; RFID privacy; fraud detection; consumer privacy protection; passive RFID tags

Subjects: Cryptography; RFID systems; Protocols

Preview this chapter:
Zoom in
Zoomout

RFID privacy and authentication protocols, Page 1 of 2

| /docserver/preview/fulltext/books/ce/pbce112e/PBCE112E_ch9-1.gif /docserver/preview/fulltext/books/ce/pbce112e/PBCE112E_ch9-2.gif

Related content

content/books/10.1049/pbce112e_ch9
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address