Research on a provable security RFID authentication protocol based on Hash function

被引:0
|
作者
Yu Yinhui [1 ]
Zhang Lei [1 ]
机构
[1] College of Communication Engineering, Jilin University
关键词
mutual authentication protocol; provable security method; Hash function; RFID system;
D O I
暂无
中图分类号
TP391.44 [];
学科分类号
0811 ; 081101 ; 081104 ; 1405 ;
摘要
Research on existing radio frequency identification(RFID) authentication protocols security risks, poor performance and other problems, a RFID security authentication protocol based on dynamic identification(ID) and Key value renewal is proposed. Meanwhile, the security problems based on Hash function RFID security authentication protocol in recent years have been also sorted and analyzed. Then a security model to design and analyze RFID protocols is built. By using the computational complexity, its correctness and security have been proved. Compared with the safety performance, storage overhead, computational overhead and other aspects of other protocols, the protocol for RFID has more efficient performance and ability to withstand various attacks. And the C# programming language is used to simulate the authentication process on the visual studio platform, which verifies the feasibility of the protocol.
引用
收藏
页码:31 / 37
页数:7
相关论文
共 50 条
  • [1] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2016, 23 (02) : 31 - 37
  • [2] Research on a provable security RFID authentication protocol based on Hash function
    Yinhui, Yu (yuyh@jlu.edu.cn), 2016, Beijing University of Posts and Telecommunications (23):
  • [3] Research on RFID Security Authentication Protocol Based on HASH Function
    Chen, Zhen-huan
    Pan, Xue-feng
    2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255
  • [4] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [5] An Improvement RFID Security Authentication Protocol Based on Hash Function
    Sun, Haowen
    Li, Peng
    Xu, He
    Zhu, Feng
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 375 - 384
  • [6] Research on hash-based RFID security authentication protocol
    Ding, Zhenhua
    Li, Jintao
    Feng, Bo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (04): : 583 - 592
  • [7] Research on Hash-Based low-cost RFID Security Authentication Protocol
    Huo Lin
    Jiang Yilin
    Hu Liangqing
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1524 - 1530
  • [8] Mobile RFID Mutual Authentication Protocol Based on Hash Function
    Yu, Wenjin
    Jiang, Yixiang
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 358 - 361
  • [10] Forward private RFID authentication protocol based on universal hash function
    Gao, S. (shujing_g@126.com), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (10):