Journal of University of Science and Technology of China ›› 2011, Vol. 41 ›› Issue (7): 594-598.DOI: 10.3969/j.issn.0253-2778.2011.07.005

Previous Articles     Next Articles

RFID cryptographic protocol based on two-dimensional region Hash chain

XIONG Wanxing   

  1. Information Network Lab, Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei 230027, China
  • Received:2011-04-28 Revised:2011-06-23 Online:2011-07-31 Published:2011-07-31

Abstract: Due to the limitation of relevant devices, a lot of security problems exist in a radio frequency identification (RFID) system, one of the core technologies of the future internet of things (IOT). A new protocol based on the two-dimensional region (TDR) Hash chains was proposed after the core ideas of several typical RFID cryptographic protocols were analyzed. TDR could significantly improve the efficiency of database retrieval by identifying each Hash chain with region division. Moreover, a random number was introduced to further enhance the security of RFID systems.

Key words: RFID, cryptographic protocol, two-dimensional region Hash chain