Enhanced Hash Chain based Scheme for Security and Privacy in RFID Systems
Author(s) -
Vaibhaw Dixit,
Harsh Kumar Verma,
Akhil K. Singh
Publication year - 2011
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/3415-4765
Subject(s) - computer science , hash chain , computer security , hash function , scheme (mathematics) , chain (unit) , internet privacy , computer network , mathematical analysis , mathematics , physics , astronomy
research Paper describes security and privacy issues in RFID systems and proposes a new enhanced algorithm. Our proposed protocol is an enhancement over Sang-Soo Yeo and Sung Kwon Kim" protocol and it provides better security and privacy. Comparative analysis of our proposed protocol and Yeo et al. protocol is done on the basis of various parameters like number of tags, length of hash chain, number of groups etc. The simulation is done using Sun Microsystems Java and results are analyzed using visual inspection.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom