A Hash-based RFID Search Protocol for Mobile Reader

Mobile readers are used more and more remarkably, so a persistent connection between a backend server and mobile readers cannot be guaranteed, it brings higher security requirements for RFID systems. RFID search protocol which is used to find specific tags has many applications such as inventory management, supply chain management. In this paper, a hash-based RFID search protocol for mobile readers is proposed, it can meet all known major attacks in RFID systems, and it can protect the privacy of mobile reader holders especially.

[1]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[2]  Dong Hoon Lee,et al.  RFID tag search protocol preserving privacy of mobile reader holders , 2011, IEICE Electron. Express.

[3]  Tatsuo Nakajima,et al.  Secure and efficient tag searching in RFID systems using serverless search protocol , 2008 .

[4]  Ouyang Dantong,et al.  A Lightweight RFID Authentication Protocol for Mobile Reader , 2012 .

[5]  Yanjun Zuo Secure and private search protocols for RFID systems , 2010, Inf. Syst. Frontiers.

[6]  Hung-Yu Chien,et al.  Server‐less RFID authentication and searching protocol with enhanced security , 2012, Int. J. Commun. Syst..

[7]  Bo Sheng,et al.  Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.

[8]  Steven G. Johnson,et al.  The Design and Implementation of FFTW3 , 2005, Proceedings of the IEEE.

[9]  Jong Hyuk Park,et al.  Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments , 2010, Wirel. Pers. Commun..

[10]  Myunghee Son,et al.  Design and implementation of mobile RFID technology in the CDMA networks , 2006, 2006 8th International Conference Advanced Communication Technology.

[11]  Howon Kim,et al.  Design of an Extended Architecture for Secure Low-Cost 900MHz UHF Mobile RFID Systems , 2006, 2006 IEEE International Symposium on Consumer Electronics.

[12]  Dong Hoon Lee,et al.  Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[13]  L. Sydanheimo,et al.  Use and interface definition of mobile RFID reader integrated in a smart phone , 2005, Proceedings of the Ninth International Symposium on Consumer Electronics, 2005. (ISCE 2005)..

[14]  S.I. Ahamed,et al.  S3PR: Secure Serverless Search Protocols for RFID , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[15]  Foreword and Editorial International Journal of Hybrid Information Technology , 2022 .

[16]  Ouyang Dantong,et al.  An Efficient Lightweight RFID Authentication Protocol for Low-cost Tags , 2011 .