Research on Authentication Protocol of RFID Based on Multi-Level Security Policy

被引:0
|
作者
Su, Qing [1 ]
Li, Yong-zhen [1 ]
机构
[1] Yanbian Univ Yanji, Dept Comp Sci & Technol, Yanji, Peoples R China
关键词
multi-level security policy; RFID; access control; security level; SYSTEMS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID technology is widely applied to all aspects of humans' daily lives. As a result, the security and privacy issues of low-cost RFID system become a research hotspot. This paper puts forward a RFID authentication protocol based on the multilevel security strategy. Compared with traditional security authentication protocol, new protocol not only reduces the hardware requirements of the label and the power consumption of the whole system, but also has more flexibility to safely protect the privacy of our users. The multilevel security authentication pattern employed in the protocol can effectively resist a variety of known attacks, especially against the unauthorized tag attack and unauthorized information of authorized tag attack. The new authentication model is more secure, has less hardware requirements and is more suitable for low-cost RFID system.
引用
收藏
页码:128 / 131
页数:4
相关论文
共 50 条
  • [31] An authentication protocol in a security layer for RFID smart tags
    Feldhofer, M
    [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 759 - 762
  • [32] Mutual Authentication Protocol for RFID Security using NFSR
    Suresh, T.
    Ramakrishnan, M.
    [J]. PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2015, : 255 - 259
  • [33] A Revised Serverless Authentication Protocol with Forward Security for RFID
    He Lei
    Gan Yong
    Li Na-na
    Zhang Tao
    [J]. APPLIED MECHANICS AND MECHANICAL ENGINEERING, PTS 1-3, 2010, 29-32 : 2267 - 2272
  • [34] A RFID Mutual Authentication Security Protocol Design and Analysis
    Liang, Xiaobing
    Lv, Yingjie
    Zhao, Bing
    Liu, Ying
    Sun, Zhiqiang
    Cen, Wei
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 508 - 512
  • [35] An authentication protocol in a security layer for RFID smart tags
    Feldhofer, Martin
    [J]. Proc Mediterr Electrotech Conf MELECON, 1600, (759-762):
  • [36] Security Analysis of a Mutual Authentication Protocol for RFID Systems
    Yang, Yuanyuan
    Lu, Zhen
    Chen, Zhuo
    Wei, Xiang
    Gu, Jian
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 252 - 255
  • [37] Multi-level authentication for security in cloud using improved quantum key distribution
    Kumar, Ashutosh
    Verma, Garima
    [J]. NETWORK-COMPUTATION IN NEURAL SYSTEMS, 2024,
  • [38] Secure RFID Authentication Schemes Based on Security Analysis and Improvements of the USI Protocol
    Gao, Lijun
    Zhang, Lu
    Lin, Feng
    Ma, Maode
    [J]. IEEE ACCESS, 2019, 7 : 8376 - 8384
  • [39] A quadratic residue-based RFID authentication protocol with enhanced security for TMIS
    Zhou, Zhiping
    Wang, Ping
    Li, Zhicong
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (09) : 3603 - 3615
  • [40] Multi-level Authentication System for Smart Home-Security Analysis and Implementation
    Peter, Sherin
    Gopal, Raju. K.
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 49 - 55