Zhou Jing-Xian, Li Hao, Zhou Ya-Jian, Li Guo-You, Zhang Miao. Server-less Radio Frequency Identification Tag Secure Searching Protocols[J]. Journal of Electronics & Information Technology, 2012, 34(11): 2582-2586. doi: 10.3724/SP.J.1146.2012.00610
Citation:
Zhou Jing-Xian, Li Hao, Zhou Ya-Jian, Li Guo-You, Zhang Miao. Server-less Radio Frequency Identification Tag Secure Searching Protocols[J]. Journal of Electronics & Information Technology, 2012, 34(11): 2582-2586. doi: 10.3724/SP.J.1146.2012.00610
Zhou Jing-Xian, Li Hao, Zhou Ya-Jian, Li Guo-You, Zhang Miao. Server-less Radio Frequency Identification Tag Secure Searching Protocols[J]. Journal of Electronics & Information Technology, 2012, 34(11): 2582-2586. doi: 10.3724/SP.J.1146.2012.00610
Citation:
Zhou Jing-Xian, Li Hao, Zhou Ya-Jian, Li Guo-You, Zhang Miao. Server-less Radio Frequency Identification Tag Secure Searching Protocols[J]. Journal of Electronics & Information Technology, 2012, 34(11): 2582-2586. doi: 10.3724/SP.J.1146.2012.00610
Radio Frequency IDentification (RFID) tag search protocols are used in a situation where an reader finds a specific tag among multiple tags, which play important roles in many RFID applications. However, the existing protocols either have security weaknesses or exhibit poor efficiency. In this paper, a server-less RFID tag secure search protocol is proposed, which utilizes hash function and timestamp. GNY logic is used to prove its correctness. Analysis shows that presented protocol can be used to search a particular tag efficiently, and preserve tags privacy against all major attacks.