Research on a provable security RFID authentication protocol based on Hash function

被引:0
|
作者
Yu Yinhui [1 ]
Zhang Lei [1 ]
机构
[1] College of Communication Engineering, Jilin University
关键词
mutual authentication protocol; provable security method; Hash function; RFID system;
D O I
暂无
中图分类号
TP391.44 [];
学科分类号
0811 ; 081101 ; 081104 ; 1405 ;
摘要
Research on existing radio frequency identification(RFID) authentication protocols security risks, poor performance and other problems, a RFID security authentication protocol based on dynamic identification(ID) and Key value renewal is proposed. Meanwhile, the security problems based on Hash function RFID security authentication protocol in recent years have been also sorted and analyzed. Then a security model to design and analyze RFID protocols is built. By using the computational complexity, its correctness and security have been proved. Compared with the safety performance, storage overhead, computational overhead and other aspects of other protocols, the protocol for RFID has more efficient performance and ability to withstand various attacks. And the C# programming language is used to simulate the authentication process on the visual studio platform, which verifies the feasibility of the protocol.
引用
收藏
页码:31 / 37
页数:7
相关论文
共 50 条
  • [31] A Coding Theory Based Ultralightweight RFID Authentication Protocol with CRC
    Maurya, Pramod Kumar
    Pal, Joydeb
    Bagchi, Satya
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (01) : 967 - 976
  • [32] Enhancements to a Lightweight RFID Authentication Protocol
    Zhang, Xiaowen
    Zhang, Zhanyang
    Wei, Xinzhou
    ICEBE 2009: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2009, : 454 - +
  • [33] On the security of the visual hash function
    Radhakrishnan, R
    Xiong, ZY
    Memon, N
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 644 - 652
  • [34] An Effective RFID Security Protocol Based on Secret Sharing
    Gao, Zhijian
    Jiang, Yi
    Lin, Zhenxiong
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 780 - 784
  • [35] SRFID: A hash-based security scheme for low cost RFID systems
    Khedr, Walid I.
    EGYPTIAN INFORMATICS JOURNAL, 2013, 14 (01) : 89 - 98
  • [36] Hash-Based Password Authentication Protocol Against Phishing and Pharming Attacks
    Kim, Iksu
    Cho, Yongyun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (01) : 343 - 355
  • [37] Quadratic residue-based unilateral authentication protocol for RFID system
    Pramod Kumar Maurya
    Satya Bagchi
    Multimedia Tools and Applications, 2023, 82 : 16533 - 16554
  • [38] Quadratic residue-based unilateral authentication protocol for RFID system
    Maurya, Pramod Kumar
    Bagchi, Satya
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (11) : 16533 - 16554
  • [39] Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag
    Naija, Yassine
    Beroulle, Vincent
    Machhout, Mohsen
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2018, 34 (03): : 291 - 304
  • [40] Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag
    Yassine Naija
    Vincent Beroulle
    Mohsen Machhout
    Journal of Electronic Testing, 2018, 34 : 291 - 304