Research on a provable security RFID authentication protocol based on Hash function

被引:0
|
作者
Yu Yinhui [1 ]
Zhang Lei [1 ]
机构
[1] College of Communication Engineering, Jilin University
关键词
mutual authentication protocol; provable security method; Hash function; RFID system;
D O I
暂无
中图分类号
TP391.44 [];
学科分类号
0811 ; 081101 ; 081104 ; 1405 ;
摘要
Research on existing radio frequency identification(RFID) authentication protocols security risks, poor performance and other problems, a RFID security authentication protocol based on dynamic identification(ID) and Key value renewal is proposed. Meanwhile, the security problems based on Hash function RFID security authentication protocol in recent years have been also sorted and analyzed. Then a security model to design and analyze RFID protocols is built. By using the computational complexity, its correctness and security have been proved. Compared with the safety performance, storage overhead, computational overhead and other aspects of other protocols, the protocol for RFID has more efficient performance and ability to withstand various attacks. And the C# programming language is used to simulate the authentication process on the visual studio platform, which verifies the feasibility of the protocol.
引用
收藏
页码:31 / 37
页数:7
相关论文
共 50 条
  • [41] Data Information Security Algorithm Based on Chaos and Hash Function
    Liu, Hui
    APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2023,
  • [42] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
  • [43] Stream Cipher-Based Hash Function and Its Security
    Nakano, Yuto
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 222 : 188 - 202
  • [44] An efficient mutual authentication protocol on RFID tags
    Huang, Hui-Feng
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 550 - +
  • [45] A Revised SRAC Authentication Protocol in RFID System
    He Lei
    Lu Xin-mei
    2011 INTERNATIONAL CONFERENCE ON FUTURE INFORMATION ENGINEERING (ICFIE 2011), 2011, 8 : 19 - 24
  • [46] An optical Hash function construction based on equal modulus decomposition for authentication verification
    Kumar, Avishek
    Fatima, Areeba
    Nishchal, Naveen K.
    OPTICS COMMUNICATIONS, 2018, 428 : 7 - 14
  • [47] New ECC-Based IoT Authentication Protocol for Securing RFID Systems
    Timouhin H.
    Amounas F.
    Azrour M.
    SN Computer Science, 4 (6)
  • [48] Challenge-response based RFID authentication protocol for distributed database environment
    Rhee, K
    Kwak, J
    Kim, S
    Won, D
    SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2005, 3450 : 70 - 84
  • [49] Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2167 - 2170
  • [50] Improving the security of a parallel keyed hash function based on chaotic maps
    Xiao, Di
    Liao, Xiaofeng
    Wang, Yong
    PHYSICS LETTERS A, 2009, 373 (47) : 4346 - 4353