Authors: Christopher Bolan
Addresses: School of Computer and Information Science, Edith Cowan University, 2 Bradford Street, Mount Lawley, WA 6050, Australia
Abstract: With the increased awareness of the potential of RFID technology across a range of applications and as a new source of information, emerges new points of attack. Due to cost issues most proposals focus on securing the RFID reader rather than the tag. This paper investigates some of the low-cost proposals for securing RFID tags from potential misuse through authentication and encryption.
Keywords: radio frequency identification; RFID tags; hash locking; encryption; tag security; information security; computer security; authentication.
International Journal of Information and Computer Security, 2007 Vol.1 No.4, pp.391 - 399
Published online: 22 Oct 2007 *Full-text access for editors Access for subscribers Purchase this article Comment on this article