RFID Bi-directional Authentication Protocol Based on Random Number and Hash Function

被引:0
|
作者
Liu Jian-dong [1 ]
Wang Ye-quan [1 ]
Zhang Xiao [1 ]
Shang Kai [1 ]
机构
[1] Beijing Inst Petrochem Technol, Sch Informat Engn, Beijing 102617, Peoples R China
来源
PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS | 2015年 / 35卷
关键词
RFID; Random number; Hash function; authentication protocol;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
On the basis of the analysis of commonly used RFID authentication protocols' shortcomings, this paper proposes a random number and hash function based RFID bi-directional authentication protocol. This protocol can resolve eavesdropping, illegal access, location tracking, impersonation and replay attack.
引用
收藏
页码:919 / 922
页数:4
相关论文
共 50 条
  • [41] High-efficient RFID Authentication Protocol Based on Physical Unclonable Function
    He, ZhangQing
    Zou, Ling
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [42] Research and Implementation in RFID Authentication Protocol Based on Bloom Filter
    Li, Chun-hua
    Sui, Bi-xia
    2011 AASRI CONFERENCE ON INFORMATION TECHNOLOGY AND ECONOMIC DEVELOPMENT (AASRI-ITED 2011), VOL 2, 2011, : 4 - 7
  • [43] ECC-Based RFID Authentication Protocol
    Yang X.-C.
    Xu C.-X.
    Li C.-R.
    Journal of Electronic Science and Technology, 2020, 18 (04) : 320 - 329
  • [44] An Authentication Protocol Based on Combined RFID-Biometric System
    Chikouche, Noureddine
    Cherif, Foudil
    Benmohammed, Mohamed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (04) : 62 - 67
  • [45] IoT Device Security: Challenging "A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function"
    Bendavid, Ygal
    Bagheri, Nasour
    Safkhani, Masoumeh
    Rostampour, Samad
    SENSORS, 2018, 18 (12)
  • [46] A COLLISION RESISTANCE SECURE HASH ALGORITHM BASED ON A PSEUDO-RANDOM SEQUENCE GENERATOR FOR AUTHENTICATION PROTOCOL
    Yousuf, Ahmed Y.
    Atia, Tayseer S.
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2022, 17 (04): : 2877 - +
  • [47] A Survey of RFID Authentication Protocols Based on Hash-Chain Method
    Syamsuddin, Irfan
    Dillon, Tharam
    Chang, Elizabeth
    Han, Song
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 559 - 564
  • [48] Hash-Based Password Authentication Protocol Against Phishing and Pharming Attacks
    Kim, Iksu
    Cho, Yongyun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (01) : 343 - 355
  • [49] A LIGHTWEIGHT RFID AUTHENTICATION PROTOCOL USING PHYSICAL UNCLONABLE FUNCTION
    Zhang Zi-nan
    Guo Yuan-bo
    Liu-Wei
    2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 2: FUTURE COMMUNICATION AND NETWORKING, 2011, : 265 - 268
  • [50] A Cloud-based RFID Authentication Protocol with Insecure Communication Channels
    Xiao, Hannan
    Alshehri, Awatif Ali
    Christianson, Bruce
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 332 - 339