A Security RFID Authentication Protocol Based on Hash Function

被引:7
作者
Yu Tian-tian [1 ]
Feng Quan-yuan [1 ]
机构
[1] SW Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
来源
IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS | 2009年
关键词
RFID; Authentication Protocol; Hash Function;
D O I
10.1109/IEEC.2009.174
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In RFID system, a critical issue is security and privacy problem. Firstly, several typical methods to against security and privacy problems are introduced, then based on this protocols, and aim at the shortages in them and other improved ones which provided by some literatures, we propose a new improved scheme based on hash function. The modified scheme resists illegal access, tracking, eavesdropping, impersonation and replay attack, fits for the case which the number of tags is large and is security and efficiency.
引用
收藏
页码:804 / 807
页数:4
相关论文
共 6 条
[1]  
AVOINE G, 2005, 2 IEEE INT WORKSH PE
[2]  
Gao XX, 2004, PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY FOR DYNAMIC E-BUSINESS, P164
[3]  
Lan Zhang, 2005, P WIR COMM NETW MOB, P1195
[4]   An efficient and secure RFID security method with ownership transfer [J].
Osaka, Kyosuke ;
Takagi, Tsuyoshi ;
Yamazaki, Kenichi ;
Takahashi, Osamu .
2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, :1090-1095
[5]   YA-TRAP: Yet another trivial RFID authentication protocol [J].
Tsudik, G .
FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, :640-+
[6]  
Weis StephenA., 2003, Security and privacy aspects of low-cost radio frequency identification systems, P201