RFID Mutual Authentication Protocols Using Key Exchange Based on Hash Functions

被引:0
|
作者
Jang, Seung-Jae [1 ]
Jung, Young-Hoon [1 ]
Min, So-Yeon [2 ]
Lee, Keun-Wang [3 ]
Jun, Moon-Seog [1 ]
机构
[1] Soongsil Univ, Dept Comp Sci, Seoul 156743, South Korea
[2] Seoil Univ, Dept Internet Informat, Seoul 131702, South Korea
[3] Chungwoon Univ, Dept Multimedia Sci, Hongseong 350701, South Korea
来源
关键词
RFID; Authentication; Key Exchange; Hash; XOR;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A RFID system is a key technology used to create a ubiquitous society through non-contact radio identification technology, expected to provide us with information far above time and space. However, several security issues including a matter of privacy have been raised on account of restricted features of RFID communication environment. A variety of studies have been underway to bring solutions to them, but existing studies require excessive processing capabilities for security problems, tags and back-end database. To solve out this problem, this paper suggests mutual authentication RFID protocols that can guarantee safety from spoofing and re-transfer attack and also reduce the number of comparative operations in the back-end database, with the use of hash functions. XOR operation and key exchange.
引用
收藏
页码:246 / +
页数:3
相关论文
共 50 条
  • [21] RFID mutual-authentication protocol with synchronous updatedkeys based on Hash function
    Zhang Xiaohong
    Hu Yingmeng
    The Journal of China Universities of Posts and Telecommunications, 2015, 22 (06) : 27 - 35
  • [22] Comments on mutual authentication and key exchange protocols for low power wireless communications
    Ng, SL
    Mitchell, C
    IEEE COMMUNICATIONS LETTERS, 2004, 8 (04) : 262 - 263
  • [23] Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
    Jiang, Yixin
    Lin, Chuang
    Shen, Xuemin
    Shi, Minghui
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2006, 5 (09) : 2569 - 2577
  • [24] The study of mutual authentication and key exchange protocols for low power wireless communications
    Yan Lili
    Peng Daiyuan
    Gao Yuexiang
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [25] Universally composable symbolic analysis of mutual authentication and key-exchange protocols
    Canetti, Ran
    Heizog, Jonathan
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 380 - 403
  • [26] RFID Mutual Authentication Protocols with Universally Composable Security
    Su, Chunhua
    Li, Yingjiu
    Deng, Robert H.
    RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY (RFIDSEC'11), 2011, 6 : 35 - 49
  • [27] Survey and remedy of mutual authentication protocols for RFID system
    Jeng, Albert
    Chang, Li-Chung
    Ho, Huang-Kuan
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3361 - +
  • [28] A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System
    Keerti Srivastava
    Amit K. Awasthi
    Sonam D. Kaul
    R. C. Mittal
    Journal of Medical Systems, 2015, 39
  • [29] A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System
    Srivastava, Keerti
    Awasthi, Amit K.
    Kaul, Sonam D.
    Mittal, R. C.
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (01)
  • [30] An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol
    Ren, Xuping
    Xu, Xianghua
    Li, Yunfa
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2405 - 2412