Search for collections on PNUP Repository

A Survey of RFID Authentication Protocols Based on Hash-Chain Method

Syamsuddin, Irfan (2008) A Survey of RFID Authentication Protocols Based on Hash-Chain Method. In: Third 2008 International Conference on Convergence and Hybrid Information Technology.

[thumbnail of Paper International Conference] Text (Paper International Conference)
C016_ORIGINAL PAPER Irfan_RFID_IEEE_ICCIT_2008.pdf - Published Version

Download (281kB)
[thumbnail of Similarity Check] Text (Similarity Check)
C016_SIMILARITY CHECK Irfan_RFID_IEEE_ICCIT_2008.pdf - Supplemental Material

Download (2MB)

Abstract

Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations.

Item Type: Conference or Workshop Item (Paper)
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Jurusan Teknik Elektro > D4 Teknik Komputer dan Jaringan
Depositing User: Unnamed user with username 197312202000031008
Date Deposited: 03 Apr 2023 17:17
Last Modified: 03 Apr 2023 17:17
URI: https://repository.poliupg.ac.id/id/eprint/219

Actions (login required)

View Item
View Item