Research on Authentication Protocol of RFID Based on Multi-Level Security Policy

被引:0
|
作者
Su, Qing [1 ]
Li, Yong-zhen [1 ]
机构
[1] Yanbian Univ Yanji, Dept Comp Sci & Technol, Yanji, Peoples R China
关键词
multi-level security policy; RFID; access control; security level; SYSTEMS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID technology is widely applied to all aspects of humans' daily lives. As a result, the security and privacy issues of low-cost RFID system become a research hotspot. This paper puts forward a RFID authentication protocol based on the multilevel security strategy. Compared with traditional security authentication protocol, new protocol not only reduces the hardware requirements of the label and the power consumption of the whole system, but also has more flexibility to safely protect the privacy of our users. The multilevel security authentication pattern employed in the protocol can effectively resist a variety of known attacks, especially against the unauthorized tag attack and unauthorized information of authorized tag attack. The new authentication model is more secure, has less hardware requirements and is more suitable for low-cost RFID system.
引用
收藏
页码:128 / 131
页数:4
相关论文
共 50 条
  • [1] Authentication Protocol of RFID System Based on Security Policy
    Wang, Guichao
    Wang, Yan
    Li, Yongzhen
    [J]. 2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, : 1242 - 1246
  • [2] DESIGNING OF AUTHENTICATION PROTOCOL FOR MULTI-LEVEL SECURITY VIRTUAL DESKTOPS
    Liu, Yanbing
    Zhang, Haijun
    Ma, Jing
    Xiao, Yunpeng
    [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2014, : 465 - 469
  • [3] Research on RFID Security Authentication Protocol Based on HASH Function
    Chen, Zhen-huan
    Pan, Xue-feng
    [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255
  • [4] Research on hash-based RFID security authentication protocol
    Ding, Zhenhua
    Li, Jintao
    Feng, Bo
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (04): : 583 - 592
  • [5] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    [J]. The Journal of China Universities of Posts and Telecommunications., 2016, 23 (02) - 37
  • [6] Research on a provable security RFID authentication protocol based on Hash function
    [J]. Yinhui, Yu (yuyh@jlu.edu.cn), 2016, Beijing University of Posts and Telecommunications (23):
  • [7] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    [J]. The Journal of China Universities of Posts and Telecommunications, 2016, (02) : 31 - 37
  • [8] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    [J]. 2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [9] Research on Multiple security authentication protocol in RFID System
    Xia, Hui
    [J]. FRONTIERS OF MECHANICAL ENGINEERING AND MATERIALS ENGINEERING II, PTS 1 AND 2, 2014, 457-458 : 770 - 773
  • [10] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    [J]. IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807