Research on Authentication Protocol of RFID Based on Multi-Level Security Policy

被引:0
|
作者
Su, Qing [1 ]
Li, Yong-zhen [1 ]
机构
[1] Yanbian Univ Yanji, Dept Comp Sci & Technol, Yanji, Peoples R China
关键词
multi-level security policy; RFID; access control; security level; SYSTEMS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID technology is widely applied to all aspects of humans' daily lives. As a result, the security and privacy issues of low-cost RFID system become a research hotspot. This paper puts forward a RFID authentication protocol based on the multilevel security strategy. Compared with traditional security authentication protocol, new protocol not only reduces the hardware requirements of the label and the power consumption of the whole system, but also has more flexibility to safely protect the privacy of our users. The multilevel security authentication pattern employed in the protocol can effectively resist a variety of known attacks, especially against the unauthorized tag attack and unauthorized information of authorized tag attack. The new authentication model is more secure, has less hardware requirements and is more suitable for low-cost RFID system.
引用
收藏
页码:128 / 131
页数:4
相关论文
共 50 条
  • [41] Blockchain-based Mutual Authentication Security Protocol for Distributed RFID Systems
    Wang, Siye
    Zhu, Shaoyi
    Zhang, Yanfang
    [J]. 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 74 - 77
  • [42] A new security and privacy on RFID mutual authentication protocol based on partial ID
    Zhang, Hui
    Hou, Chao-Huan
    Wang, Dong-Hui
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (04): : 853 - 856
  • [43] RFID tag-based mutual authentication protocol with improved security for TMIS
    Chander, Bhanu
    Gopalakrishnan, Kumaravelan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (3-4) : 383 - 405
  • [44] A quadratic residue-based RFID authentication protocol with enhanced security for TMIS
    Zhiping Zhou
    Ping Wang
    Zhicong Li
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 3603 - 3615
  • [45] Cognitively managed multi-level authentication for security using Fuzzy Logic based Quantum Key Distribution
    Shabbir, Maryam
    Ahmad, Fahad
    Shabbir, Ayesha
    Alanazi, Saad Awadh
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (04) : 1468 - 1485
  • [46] Multi-Level ECDH-Based Authentication Protocol for Secure Software-Defined VANET Interaction
    Raut, Umesh K.
    Vishwamitra, L. K.
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2022, 13 (01)
  • [47] Multi-level authentication based on two-beam interference
    He Wen-Qin
    Peng Xiang
    Meng Xiang-Feng
    Liu Xiao-Li
    [J]. ACTA PHYSICA SINICA, 2013, 62 (06)
  • [48] Development of Multi-Level Speech based Person Authentication System
    Rohan Kumar Das
    Sarfaraz Jelil
    S. R. Mahadeva Prasanna
    [J]. Journal of Signal Processing Systems, 2017, 88 : 259 - 271
  • [49] Multi-level signature based biometric authentication using watermarking
    Maiorana, Emanuele
    Campisi, Patrizio
    Neri, Alessandro
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [50] Development of Multi-Level Speech based Person Authentication System
    Das, Rohan Kumar
    Jelil, Sarfaraz
    Prasanna, S. R. Mahadeva
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2017, 88 (03): : 259 - 271