Study on Security Analysis of RFID

  • Yi Hou
  • Jialin Ma
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 297)


This document is in the required format. The specialties and limitation of RFID system and device will incur lots of security problems especially when the system contains a lot of tags and many readers, the traditional methods become helpless. Here we present and analyze an improved hash key technique based on multiple readers.


RFID Security Reader tag Hash Algorithm 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Zhou, Y.-B., Feng, D.-G.: Design and Analysis of Cryptographic Protocols for RFID. J. Chinese Journal of Computers, 23–25 (2006)Google Scholar
  2. 2.
    Riebackmr, Crispo, B., Tanenbaum, A.S.: The evolution of RFID security. IEEE Pervasive Computing, 62–69 (2006)Google Scholar
  3. 3.
    Su, W., Cui, Z., Wang, X.-J.: Research on Hash chain-based RFID privacy enhancement tag. J. Computer Applications (10) (2006)Google Scholar
  4. 4.
    Thornton, F.: Syngress RFID Security. Syngress Publishing, Canada (2006)Google Scholar
  5. 5.
    Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes (2003)Google Scholar
  6. 6.
    Castelluccia, C., Avoine, G.: Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 289–299. Springer, Heidelberg (2006)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Yi Hou
    • 1
  • Jialin Ma
    • 2
  1. 1.Shenyang Radio and TV UniversityShenyangChina
  2. 2.Shenyang Normal UniversityShenyangChina

Personalised recommendations