Information Technology Journal1812-56381812-5646Asian Network for Scientific Information10.3923/itj.2011.1917.1925SandhyaM. RangaswamyT.R. 1020111010This study describes the characteristics of data tampering in RFID-based information systems and a method addressing it is proposed using hashing techniques in mobile RFID environment. The proposed method requires only hash, XOR and simple calculations but can provide good security and privacy protection features. Mobile RFID-enhanced applications (Mobile RFID) offer a unique way of interacting with the physical world by using the touch paradigm. They offer an intuitive way to interact with physical objects to which RFID transponders are attached. However, the development of mobile RFID applications is not well supported yet, in contrast to stationary RFID applications because of security and privacy related issues. A critical threat for Mobile RFID based information systems is represented by data tampering which corresponds to the malicious alteration of data recorded in the tag memory.]]>Juels, A.,20053352149164Juels, A. and R. Pappu,20032742103121Juels, A.,200624381394Wang, C.H. and S. Chin, 20092009pp: 486491Chen, C.L., Y.Y. Chen, Y.C. Huang, C.S. Liu, C.I. Lin and T.F. Shih,2008811491158EPCglobal,20072007Ateniese, G., J. Camenisch and B. de Madeiros,20052005pp: 110Guo, H.P., Y.J. Li and S. Jajodia,2007177281298Lei, H., G. Yong, C. Zeng-yu and L. Na-na,20092009pp: 14Lei, H., L. Xin-mei, J. Song-he and C. Zeng-yu,20102010pp: 269272Collins, J., 20042004Yeh K.H. and N.W. Lo,20101611Zhang, K., T. Zhang and S. Pande, 20062006pp: 123134Wong, K., P. Hui and A. Chan,200657342349Madan, M. and V. Potdar and E. Chang,20062006pp: 28532859Tuyls, P. and L. Batina,20063860115131Suzuki, S. and M. Harrison,20062006Chen, S., J. Xu, E.C. Sezer, P. Gauriar and R.K. Iyer,20052005pp: 1212Zhong, S. and Y.R. Yang,200611201210Wang, S.P., Q.M. Ma, Y.L. Zhang and Y.S. Li,20102010pp: 14Weis, S., S. Sarma and R. Rivest,20033454469Dimitriou, T.,20082008pp: 370376Van Le, T., M. Burnmester and B. de Medeiros,20072007pp: 242252Tsudik, G.,20062006pp: 640643Potdar, V. and E. Chang,20062006pp: 28462852Yamamoto, A., S. Suzuki, H. Hada, J. Mitsugi, F. Teraoka and O.A. Nakamura,20082008pp: 5157Sarma, S.E., S.A. Weis and D.W. Engels,20032003pp: 454469Zhu, W., D. Wang and H. Sheng,20052005pp: 118125Konidala D.M. and K. Kim,20064296194205Garfinkel, S. and B. Rosenberg,20051st Edn.,pp: 608pp: 608Bindu, C.S., P.C.S. Reddy and B. Satyanarayana,200886266Chang, C.C. and C.Y. Lee,200835964Hsiang, H.C. and W.K. Shih,200932649652Shieh, G. and W.B. Horng,20082008pp: 122127Wang, Y.Y., J.Y. Liu, F.X. Xiao and J. Dan,200932583585Zhang, X., J. Crabtree, Y. Huang and T. Hu,201110703709Lo, S.K.C., H.C. Keh, Y.H. Lin and W. Jo-Chi,20098668677Idris, M.Y.I., E.M. Tamil, Z. Razak, N.M. Noor and L.W. Kim,20098114127Zahrani, M.S.,20101023582368Wu, K., E. Bai and W. Zhang,20092009pp: 24402443Melski, A., L. Thoroe and M. Schumann,20072176189Al-Safadi, L. and Z. Al-Sulaiman,20111128082815