Efficient Implementation of Hash Sequence Authentication Based on RFID

被引:0
|
作者
Pratama, Andreyanto [1 ]
Hidyatullah, Taufik [1 ]
Putranto, Dedy Septono Catur [1 ]
机构
[1] Natl Crypto Inst, Sekolah Tinggi Sandi Negara, Bogor, West Java, Indonesia
来源
2017 15TH INTERNATIONAL CONFERENCE ON QUALITY IN RESEARCH (QIR) - INTERNATIONAL SYMPOSIUM ON ELECTRICAL AND COMPUTER ENGINEERING | 2017年
关键词
lamport; authentication; hash function; arduino; rfid; SECURITY; PROTOCOL; SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security for accessing an area need to be noticed. Access restriction can be applied using authentication such as password. Thereby, the strong password is required, but it is hard to remember. Strong password can be generated by using hash function and stored on smart card can be solution. Smart card can be used as access card. Nevertheless, vulnerabilities of the card need to be noticed. Lamport's scheme as hash sequence authentication can be implemented to create dynamic access card which replicate resistant. Hash sequence authentication used to authenticate the prover. The prover should give hash value as input that has result equal with the verifier has. This scheme will be implemented using Arduino Mega ADK. The result of this research is a login hardware prototype.
引用
收藏
页码:468 / 473
页数:6
相关论文
共 50 条
  • [1] Review on RFID Identity Authentication Protocols Based on Hash Function
    Yang Bing
    Liu Baolong
    Chen Hua
    2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 20 - 27
  • [2] A Lightweight Hash-Based Mutual Authentication Protocol for RFID
    Li, Zhangbing
    Zhong, Xiaoyong
    Chen, Xiaochun
    Liu, Jianxun
    MANAGEMENT OF INFORMATION, PROCESS AND COOPERATION, 2017, 686 : 87 - 98
  • [3] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [4] An Efficient Hash-based RFID Grouping Authentication Protocol Providing Missing Tags Detection
    Tan, Haowen
    Choi, Dongmin
    Kim, Pankoo
    Pan, Sungbum
    Chung, Ilyong
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (02): : 481 - 488
  • [5] Improvement of the Hash-Based RFID Mutual Authentication Protocol
    Dehkordi, Masoud Hadian
    Farzaneh, Yousof
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (01) : 219 - 232
  • [6] Improvement of the Hash-Based RFID Mutual Authentication Protocol
    Masoud Hadian Dehkordi
    Yousof Farzaneh
    Wireless Personal Communications, 2014, 75 : 219 - 232
  • [7] Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol
    Sun, Da-Zhi
    Zhong, Ji-Dong
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1085 - 1093
  • [8] A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems
    Deebak, B. D.
    Al-Turjman, Fadi
    Mostarda, Leonardo
    SENSORS, 2019, 19 (18)
  • [9] Efficient RFID authentication protocols based on pseudorandom sequence generators
    Lee, Jooyoung
    Yeom, Yongjin
    DESIGNS CODES AND CRYPTOGRAPHY, 2009, 51 (02) : 195 - 210
  • [10] Efficient RFID authentication protocols based on pseudorandom sequence generators
    Jooyoung Lee
    Yongjin Yeom
    Designs, Codes and Cryptography, 2009, 51 : 195 - 210