Research on Hash-Based low-cost RFID Security Authentication Protocol

被引:0
作者
Huo Lin [1 ]
Jiang Yilin [1 ]
Hu Liangqing [1 ]
机构
[1] Guangxi Univ, Dept Comp & Elect Informat, Nanning 530004, Peoples R China
来源
ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2 | 2014年 / 846-847卷
关键词
RFID; security protocol; Hash authenticate; low-cost; BAN logic;
D O I
10.4028/www.scientific.net/AMR.846-847.1524
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Because RFID does not require line of sight communication, low-cost and efficient operation with these outstanding advantages RFID are being widely used, followed by privacy and security vulnerabilities and other issues. Afterdescribe and analysis the facing security issues and the existing security protocols on the stage, proposed a low-cost RFID security authentication protocol based on hash function, this protocol use hash function and random numbers to ensure the safe and efficient control access between the tags and readers,and from the perspective of quantitative estimates the cost of tag. After setting up the idealized protocol model, by using the BAN logic formal analysis this protocol, and prove the security of protocol theoretically
引用
收藏
页码:1524 / 1530
页数:7
相关论文
共 10 条
[1]  
[丁振华 Ding Zhenhua], 2009, [计算机研究与发展, Journal of Computer Research and Development], V46, P583
[2]  
Ding Zhiguo, 2009, KEY TECHNOLOGY RES I
[3]  
Hsin-Ruey Tsai, 2011, Proceedings of the 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2011), P592
[4]  
Morshed M. M., 2011, 2011 17th International Conference on Automation and Computing, P51
[5]  
Rhee K, 2005, LECT NOTES COMPUT SC, V3450, P70
[6]  
Sharaf M., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P71, DOI 10.1109/TrustCom.2012.245
[7]  
[谢磊 Xie Lei], 2013, [计算机学报, Chinese Journal of Computers], V36, P457
[8]  
Xie zhijun, 2012, RFID SENSOR NETWORKS, p[1, 128]
[9]  
Yuksel K., 2004, Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications
[10]  
Zhang Xuejun, 2012, RFID ANTICOLLISION S