Research on a provable security RFID authentication protocol based on Hash function

被引:0
|
作者
Yu Yinhui [1 ]
Zhang Lei [1 ]
机构
[1] College of Communication Engineering, Jilin University
关键词
mutual authentication protocol; provable security method; Hash function; RFID system;
D O I
暂无
中图分类号
TP391.44 [];
学科分类号
0811 ; 081101 ; 081104 ; 1405 ;
摘要
Research on existing radio frequency identification(RFID) authentication protocols security risks, poor performance and other problems, a RFID security authentication protocol based on dynamic identification(ID) and Key value renewal is proposed. Meanwhile, the security problems based on Hash function RFID security authentication protocol in recent years have been also sorted and analyzed. Then a security model to design and analyze RFID protocols is built. By using the computational complexity, its correctness and security have been proved. Compared with the safety performance, storage overhead, computational overhead and other aspects of other protocols, the protocol for RFID has more efficient performance and ability to withstand various attacks. And the C# programming language is used to simulate the authentication process on the visual studio platform, which verifies the feasibility of the protocol.
引用
收藏
页码:31 / 37
页数:7
相关论文
共 50 条
  • [31] RFID mutual-authentication protocol with synchronous updated-keys based on Hash function
    School of Information Engineering, Jiangxi University of Science and Technology, Ganzhou
    341000, China
    J. China Univ. Post Telecom., 6 (27-35):
  • [32] A security protocol of RFID communication system based on password authenticated with provable security
    Li, Kun
    Liu, Jichao
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2021, 14 (1-2) : 64 - 82
  • [33] Research on Authentication Protocol of RFID Based on Multi-Level Security Policy
    Su, Qing
    Li, Yong-zhen
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (ICCSAI 2014), 2015, : 128 - 131
  • [34] Review on RFID Identity Authentication Protocols Based on Hash Function
    Yang Bing
    Liu Baolong
    Chen Hua
    2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 20 - 27
  • [35] Hash based server/serverless adaptive and mutual authentication protocol of RFID
    Wang, Guowei
    Jia, Zongpu
    Peng, Weiping
    Open Cybernetics and Systemics Journal, 2015, 9 (01): : 483 - 490
  • [36] Authentication Protocol of RFID System Based on Security Policy
    Wang, Guichao
    Wang, Yan
    Li, Yongzhen
    2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, : 1242 - 1246
  • [37] An improved hash-based RFID two-way security authentication protocol and application in remote education
    Yang, Lvqing
    Wu, Qingqiang
    Bai, Youjing
    Zheng, Huiru
    Lin, Shufu
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2016, 31 (05) : 2713 - 2720
  • [38] A One-way Hash based Low-cost Authentication Protocol with Forward Security in RFID System
    He Lei
    Lu Xin-mei
    Jin Song-he
    Cai Zeng-yu
    2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 2, 2010, : 269 - 272
  • [39] Provable secure mutual authentication protocol for RFID in the standard model
    Xiao, Feng
    Zhou, Ya-Jian
    Zhou, Jing-Xian
    Niu, Xin-Xin
    Tongxin Xuebao/Journal on Communications, 2013, 34 (04): : 82 - 87
  • [40] A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems
    Xu, He
    Chen, Xin
    Zhu, Feng
    Li, Peng
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021