z-logo
open-access-imgOpen Access
Enhanced Hash Chain based Scheme for Security and Privacy in RFID Systems
Author(s) -
Vaibhaw Dixit,
Harsh Kumar Verma,
Akhil K. Singh
Publication year - 2011
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/3415-4765
Subject(s) - computer science , hash chain , computer security , hash function , scheme (mathematics) , chain (unit) , internet privacy , computer network , mathematical analysis , mathematics , physics , astronomy
research Paper describes security and privacy issues in RFID systems and proposes a new enhanced algorithm. Our proposed protocol is an enhancement over Sang-Soo Yeo and Sung Kwon Kim" protocol and it provides better security and privacy. Comparative analysis of our proposed protocol and Yeo et al. protocol is done on the basis of various parameters like number of tags, length of hash chain, number of groups etc. The simulation is done using Sun Microsystems Java and results are analyzed using visual inspection.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom