RFID Mutual Authentication Protocols Using Key Exchange Based on Hash Functions

被引:0
|
作者
Jang, Seung-Jae [1 ]
Jung, Young-Hoon [1 ]
Min, So-Yeon [2 ]
Lee, Keun-Wang [3 ]
Jun, Moon-Seog [1 ]
机构
[1] Soongsil Univ, Dept Comp Sci, Seoul 156743, South Korea
[2] Seoil Univ, Dept Internet Informat, Seoul 131702, South Korea
[3] Chungwoon Univ, Dept Multimedia Sci, Hongseong 350701, South Korea
来源
关键词
RFID; Authentication; Key Exchange; Hash; XOR;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A RFID system is a key technology used to create a ubiquitous society through non-contact radio identification technology, expected to provide us with information far above time and space. However, several security issues including a matter of privacy have been raised on account of restricted features of RFID communication environment. A variety of studies have been underway to bring solutions to them, but existing studies require excessive processing capabilities for security problems, tags and back-end database. To solve out this problem, this paper suggests mutual authentication RFID protocols that can guarantee safety from spoofing and re-transfer attack and also reduce the number of comparative operations in the back-end database, with the use of hash functions. XOR operation and key exchange.
引用
收藏
页码:246 / +
页数:3
相关论文
共 50 条
  • [1] Hash-based RFID Mutual Authentication Protocol
    Liu, Yang
    Peng, Yu
    Wang, Bailing
    Qu, Yun
    Bai, Xuefengi
    Yuan, Xinling
    Yin, Zelong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 183 - 194
  • [2] RFID mutual authentication protocols
    Piramuthu, Selwyn
    DECISION SUPPORT SYSTEMS, 2011, 50 (02) : 387 - 393
  • [3] Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol
    Da-Zhi Sun
    Ji-Dong Zhong
    Wireless Personal Communications, 2016, 91 : 1085 - 1093
  • [4] Improvement of the Hash-Based RFID Mutual Authentication Protocol
    Dehkordi, Masoud Hadian
    Farzaneh, Yousof
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (01) : 219 - 232
  • [5] Enhanced Hash-Based RFID Mutual Authentication Protocol
    Kim, Hyunsung
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 70 - 77
  • [6] A Lightweight Hash-Based Mutual Authentication Protocol for RFID
    Li, Zhangbing
    Zhong, Xiaoyong
    Chen, Xiaochun
    Liu, Jianxun
    MANAGEMENT OF INFORMATION, PROCESS AND COOPERATION, 2017, 686 : 87 - 98
  • [7] Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol
    Sun, Da-Zhi
    Zhong, Ji-Dong
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1085 - 1093
  • [8] Mobile RFID Mutual Authentication Protocol Based on Hash Function
    Yu, Wenjin
    Jiang, Yixiang
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 358 - 361
  • [9] Improvement of the Hash-Based RFID Mutual Authentication Protocol
    Masoud Hadian Dehkordi
    Yousof Farzaneh
    Wireless Personal Communications, 2014, 75 : 219 - 232
  • [10] Review on RFID Identity Authentication Protocols Based on Hash Function
    Yang Bing
    Liu Baolong
    Chen Hua
    2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 20 - 27