Analysis and Optimization to an NFC Security Authentication Algorithm Based on Hash Functions

被引:1
作者
Zhuang, Zai-Jiao [1 ]
Zhang, Jin [1 ]
Geng, Wei-Dong [1 ]
机构
[1] Nankai Univ, Key Lab Photoelect Thin Film Devices & Tech Tianj, Key Lab Optoelect Informat Sci & Technol, Tianjin Univ,Minist Educ,Inst Photoelect Thin Fil, Tianjin, Peoples R China
来源
2014 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORK (WCSN) | 2014年
基金
中国国家自然科学基金;
关键词
Authentication; Hash Functions; NFC; Security of Information; Storage;
D O I
10.1109/WCSN.2014.56
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, NFC security authentication solutions widely use third-party authentication platforms, but their high cost and power consumption are not conducive to popularize NFC technology. To solve this problem, this paper presents a security authentication algorithm entirely based on a Hash function. It is an independent and complete algorithm without the aid of third-party certification platform. The main research process is transplanting an authentication algorithm in RFID, and then applying it to the NFC field after a wide range of optimization and improvement. This paper first changes the initiating mechanism to reduce the system error rate and save the power consumption of initiating device. Then, it removes some key data to save the storage resources. This scheme doesn't reduce the level of security. At last, the improved algorithm is simulated by Java Socket to obtain a kind of wider adaptability among devices. Experimental results from the simulation show that, the method can maintain the safety performance, improve efficiency and save storage space. It can be competent for the application in the relevant field, such as micro-payment, access controlling, etc.
引用
收藏
页码:240 / 245
页数:6
相关论文
共 17 条
[1]  
Ceipidor U B., 2013, 2013 5 INT WORKSHOP, DOI [DOI 10.1109/NFC.2013.6482445, 10.1109/NFC.2013.6482445]
[2]  
Chan Yuk-wah, 2011, CHINESEVIETNAMESE DI, P1
[3]  
[丁振华 Ding Zhenhua], 2009, [计算机研究与发展, Journal of Computer Research and Development], V46, P583
[4]  
Dong W., 2012, SCIENCEPAPER ONLINE, V12, P566
[5]  
Ghag O., 2012, INT J COMPUT APPL, V58, P37
[6]  
[金永明 Jin Yongming], 2014, [计算机研究与发展, Journal of Computer Research and Development], V51, P1506
[7]  
Köstinger H, 2013, 2013 IEEE POINT-OF-CARE HEALTHCARE TECHNOLOGIES (PHT), P176, DOI 10.1109/PHT.2013.6461313
[8]  
Korostelev M., 2012, P 7 INT C BOD AR NET, P9
[9]  
Lee Y.S., 2013, P 3 INT C COMPUTER S, P10
[10]  
Lin J., 2013, ELECT TECHNOLOGY SOF, V17, P49