Data protection in the RFID era

Kirk Wong, Chi Leung Hui, Allan Chan

Research output: Publication in policy / professional / specialist journalArticle (for policy / professional audience)Academic researchpeer-review

2 Citations (Scopus)

Abstract

Various schemes use radio frequency identification (RFID) for apparel data protection, along with encryption algorithms for RFID tags. In the cryptography approach, particular vendor type of reader's public key and its unique private key should be carried by each tag, and during reading, with the help of embedded keys, readers and tags may mutually authenticate each other. The Hash Function approach is simple and straight forward to achieve data protection, where the electronic product code (EPC) in the tag is being protected, and only an authorized reader is able to unlock the tag, then lock the tag after reading the code. The Randomized Hash Lock is an extension of the Hash Lock based on pseudo-random functions (PRF), where an additional pseudo-random number is required to embed into tags for this approach. It is noted that if one can afford high-cost tags, then many capabilities can be incorporated inside tags, namely, computation, encryption and the like.
Original languageEnglish
Pages25-27
Number of pages3
Volume35
No.10
Specialist publicationTextile Asia
Publication statusPublished - 1 Oct 2004

ASJC Scopus subject areas

  • Business and International Management
  • General Business,Management and Accounting
  • Industrial and Manufacturing Engineering
  • Chemistry (miscellaneous)
  • Polymers and Plastics

Fingerprint

Dive into the research topics of 'Data protection in the RFID era'. Together they form a unique fingerprint.

Cite this