Research on Authentication Protocol of RFID Based on Multi-Level Security Policy

被引:0
|
作者
Su, Qing [1 ]
Li, Yong-zhen [1 ]
机构
[1] Yanbian Univ Yanji, Dept Comp Sci & Technol, Yanji, Peoples R China
关键词
multi-level security policy; RFID; access control; security level; SYSTEMS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID technology is widely applied to all aspects of humans' daily lives. As a result, the security and privacy issues of low-cost RFID system become a research hotspot. This paper puts forward a RFID authentication protocol based on the multilevel security strategy. Compared with traditional security authentication protocol, new protocol not only reduces the hardware requirements of the label and the power consumption of the whole system, but also has more flexibility to safely protect the privacy of our users. The multilevel security authentication pattern employed in the protocol can effectively resist a variety of known attacks, especially against the unauthorized tag attack and unauthorized information of authorized tag attack. The new authentication model is more secure, has less hardware requirements and is more suitable for low-cost RFID system.
引用
收藏
页码:128 / 131
页数:4
相关论文
共 50 条
  • [21] A Gen2 Based Security Authentication Protocol for RFID System
    Yi, Xiaoluo
    Wang, Liangmin
    Mao, Dongmei
    Zhan, Yongzhao
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL III, 2010, : 402 - 405
  • [22] A Gen2-Based RFID Authentication Protocol for Security and Privacy
    Sun, Hung-Min
    Ting, Wei-Chih
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (08) : 1052 - 1062
  • [23] An Gen2 Based Security Authentication Protocol for RFID System
    Yi, Xiaoluo
    Wang, Liangmin
    Mao, Dongmei
    Zhan, Yongzhao
    [J]. INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT B, 2012, 24 : 1385 - 1391
  • [24] Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain
    Muhammad Arslan Akram
    Adnan Noor Mian
    [J]. Wireless Personal Communications, 2022, 126 : 1881 - 1894
  • [25] Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain
    Akram, Muhammad Arslan
    Mian, Adnan Noor
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (02) : 1881 - 1894
  • [26] Short paper: PATRIOT - a policy-based, multi-level security protocol for safekeeping audit logs on wireless devices
    Itani, W
    Kayssi, A
    Chehab, A
    [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 240 - 242
  • [27] Research and Implementation in RFID Authentication Protocol Based on Bloom Filter
    Li, Chun-hua
    Sui, Bi-xia
    [J]. 2011 AASRI CONFERENCE ON INFORMATION TECHNOLOGY AND ECONOMIC DEVELOPMENT (AASRI-ITED 2011), VOL 2, 2011, : 4 - 7
  • [28] A UML model for multi-level security using the IPSEC ESP security protocol
    Morsi, W
    El-Fouly, T
    Badr, A
    [J]. ICEEC'04: 2004 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTER ENGINEERING, PROCEEDINGS, 2004, : 103 - 108
  • [29] A Novel Multi-level Security Policy Model for Protecting Documents
    Wang, Hui
    Jia, Zongpu
    Lu, Bibo
    Shen, Zihao
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 398 - 402
  • [30] On the Security of Chien's Ultralightweight RFID Authentication Protocol
    Sun, Hung-Min
    Ting, Wei-Chih
    Wang, King-Hang
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (02) : 315 - 317