Research on a provable security RFID authentication protocol based on Hash function

被引:0
|
作者
Yu Yinhui [1 ]
Zhang Lei [1 ]
机构
[1] College of Communication Engineering, Jilin University
关键词
mutual authentication protocol; provable security method; Hash function; RFID system;
D O I
暂无
中图分类号
TP391.44 [];
学科分类号
0811 ; 081101 ; 081104 ; 1405 ;
摘要
Research on existing radio frequency identification(RFID) authentication protocols security risks, poor performance and other problems, a RFID security authentication protocol based on dynamic identification(ID) and Key value renewal is proposed. Meanwhile, the security problems based on Hash function RFID security authentication protocol in recent years have been also sorted and analyzed. Then a security model to design and analyze RFID protocols is built. By using the computational complexity, its correctness and security have been proved. Compared with the safety performance, storage overhead, computational overhead and other aspects of other protocols, the protocol for RFID has more efficient performance and ability to withstand various attacks. And the C# programming language is used to simulate the authentication process on the visual studio platform, which verifies the feasibility of the protocol.
引用
收藏
页码:31 / 37
页数:7
相关论文
共 50 条
  • [41] Provable secure mutual RFID authentication protocol based on QC-MDPC code
    Li, Ze-Hui
    Yang, Ya-Tao
    Li, Zi-Chen
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 240 - 245
  • [42] A new hash-based authentication protocol for RFID using varying identifiers
    Li, Shu
    Yang, Xi
    Liang, Ping-yuan
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2112 - 2116
  • [43] A Provable Secure Mutual RFID Authentication Protocol Based on Error-Correct Code
    Li, Zehui
    Zhang, Ruoqing
    Yang, Yatao
    Li, Zichen
    2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 73 - 78
  • [44] A Hash-Based RFID Security Protocol for Strong Privacy Protection
    Sun, Da-Zhi
    Zhong, Ji-Dong
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2012, 58 (04) : 1246 - 1252
  • [45] Lightweight RFID Privacy Protocol Based on Universal Hash Function
    Gao, Shu-jing
    Zhang, Rui-quan
    PROCEEDINGS OF THE 5TH INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, 2015, 80 : 71 - 73
  • [46] Mutual Authentication Security RFID Protocol Based on Time Stamp
    Zhang, Changlun
    Zhang, Wenqi
    Mu, Haibing
    2015 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE THEORY, SYSTEMS AND APPLICATIONS (CCITSA 2015), 2015, : 166 - 170
  • [47] RFID security authentication protocol based on key update mechanism
    Wei, Ruidong
    Jiang, Lei
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1395 - 1401
  • [48] An Improved Security Authentication Protocol for Lightweight RFID Based on ECC
    Wei, Guo-heng
    Qin, Yan-lin
    Fu, Wei
    JOURNAL OF SENSORS, 2022, 2022
  • [49] An Efficient Authentication Key Agreement Protocol with Provable Security for VANET
    Qiao Z.-R.
    Yang Q.-L.
    Zhou Y.-W.
    Yang B.
    Gu C.-X.
    Zhang M.-W.
    Xia Z.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (05): : 929 - 944