RFID Mutual Authentication Protocols Using Key Exchange Based on Hash Functions

被引:0
|
作者
Jang, Seung-Jae [1 ]
Jung, Young-Hoon [1 ]
Min, So-Yeon [2 ]
Lee, Keun-Wang [3 ]
Jun, Moon-Seog [1 ]
机构
[1] Soongsil Univ, Dept Comp Sci, Seoul 156743, South Korea
[2] Seoil Univ, Dept Internet Informat, Seoul 131702, South Korea
[3] Chungwoon Univ, Dept Multimedia Sci, Hongseong 350701, South Korea
来源
关键词
RFID; Authentication; Key Exchange; Hash; XOR;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A RFID system is a key technology used to create a ubiquitous society through non-contact radio identification technology, expected to provide us with information far above time and space. However, several security issues including a matter of privacy have been raised on account of restricted features of RFID communication environment. A variety of studies have been underway to bring solutions to them, but existing studies require excessive processing capabilities for security problems, tags and back-end database. To solve out this problem, this paper suggests mutual authentication RFID protocols that can guarantee safety from spoofing and re-transfer attack and also reduce the number of comparative operations in the back-end database, with the use of hash functions. XOR operation and key exchange.
引用
收藏
页码:246 / +
页数:3
相关论文
共 50 条
  • [31] On password-based authenticated key exchange using collisionful hash functions
    Bakhtiari, S
    Safavi-Naini, R
    Pieprzyk, J
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 299 - 310
  • [32] Homomorphic Hash and Blockchain Based Authentication Key Exchange Protocol for Strangers
    Yao, Hailong
    Wang, Caifen
    Hai, Bo
    Zhu, Shiqiang
    2018 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2018, : 243 - 248
  • [33] Symmetric Key-Based Lightweight Authentication Protocols for RFID Security
    Rajaguru, K.
    Hansdah, R. C.
    2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 488 - 495
  • [34] MAC based lightweight protocols for strong authentication and key exchange
    Trcek, D
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2005, 21 (04) : 753 - 765
  • [36] Formal Analysis and Improvement on Ultralightweight Mutual Authentication Protocols of RFID
    XIAO Meihua
    LI Wei
    ZHONG Xiaomei
    YANG Ke
    CHEN Jia
    Chinese Journal of Electronics, 2019, 28 (05) : 1025 - 1032
  • [37] Formal Analysis and Improvement on Ultralightweight Mutual Authentication Protocols of RFID
    Xiao, Meihua
    Li, Wei
    Zhong, Xiaomei
    Yang, Ke
    Chen, Jia
    CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (05) : 1025 - 1032
  • [38] RFID mutual-authentication protocol with synchronous updated-keys based on Hash function
    School of Information Engineering, Jiangxi University of Science and Technology, Ganzhou
    341000, China
    J. China Univ. Post Telecom., 6 (27-35):
  • [39] Desynchronization Attack against a Class of RFID Mutual Authentication Protocols
    Tian, Yun
    Chen, Gongliang
    Li, Jianhua
    INFORMATION, COMMUNICATION AND EDUCATION APPLICATION, VOL 11, 2013, 11 : 141 - 146
  • [40] An improved ownership transfer and mutual authentication for lightweight RFID protocols
    Cui, Peng-Yu
    International Journal of Network Security, 2016, 18 (06) : 1173 - 1179