RFID Bi-directional Authentication Protocol Based on Random Number and Hash Function

被引:0
|
作者
Liu Jian-dong [1 ]
Wang Ye-quan [1 ]
Zhang Xiao [1 ]
Shang Kai [1 ]
机构
[1] Beijing Inst Petrochem Technol, Sch Informat Engn, Beijing 102617, Peoples R China
来源
PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS | 2015年 / 35卷
关键词
RFID; Random number; Hash function; authentication protocol;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
On the basis of the analysis of commonly used RFID authentication protocols' shortcomings, this paper proposes a random number and hash function based RFID bi-directional authentication protocol. This protocol can resolve eavesdropping, illegal access, location tracking, impersonation and replay attack.
引用
收藏
页码:919 / 922
页数:4
相关论文
共 50 条
  • [21] Review on RFID Identity Authentication Protocols Based on Hash Function
    Yang Bing
    Liu Baolong
    Chen Hua
    2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 20 - 27
  • [22] The Research of RFID Localization Technology Based on Bi-directional RSSI
    Men Chunlei
    Mao Luhong
    Wu Long
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [23] Efficient Implementation of Hash Sequence Authentication Based on RFID
    Pratama, Andreyanto
    Hidyatullah, Taufik
    Putranto, Dedy Septono Catur
    2017 15TH INTERNATIONAL CONFERENCE ON QUALITY IN RESEARCH (QIR) - INTERNATIONAL SYMPOSIUM ON ELECTRICAL AND COMPUTER ENGINEERING, 2017, : 468 - 473
  • [24] Lightweight RFID Privacy Protocol Based on Universal Hash Function
    Gao, Shu-jing
    Zhang, Rui-quan
    PROCEEDINGS OF THE 5TH INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, 2015, 80 : 71 - 73
  • [26] A Revised One-way Hash based Low-cost Authentication Protocol In RFID System
    Jiang Zhi-wei
    Shao Xiao-yan
    He Lei
    Zhang Tao
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3774 - +
  • [27] Improve Healthcare Safety Using Hash-Based Authentication Protocol for RFID Systems
    Baashirah, Rania
    Abuzneid, Abdelshakour
    Tammineedi, Akhil
    Mathew, Maneesha
    Bandaru, Neelam
    Delair, Pulkit
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 800 - 805
  • [28] Research on Hash-Based low-cost RFID Security Authentication Protocol
    Huo Lin
    Jiang Yilin
    Hu Liangqing
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1524 - 1530
  • [29] Research on the Authentication of Radio Frequency Identification based on the Hash function
    Bai Zhi
    He Yi-Gang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (06): : 209 - 216
  • [30] An improved hash-based RFID two-way security authentication protocol and application in remote education
    Yang, Lvqing
    Wu, Qingqiang
    Bai, Youjing
    Zheng, Huiru
    Lin, Shufu
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2016, 31 (05) : 2713 - 2720