A RFID Mutual Authentication Security Protocol Design and Analysis

被引:1
|
作者
Liang, Xiaobing [1 ]
Lv, Yingjie [1 ]
Zhao, Bing [1 ]
Liu, Ying [1 ]
Sun, Zhiqiang [1 ]
Cen, Wei [1 ]
机构
[1] China Elect Power Res Inst, Inst Measurement, Beijing, Peoples R China
关键词
radio frequency identification; key dispersion; mutual authentication security protocol;
D O I
10.1109/3PGCIC.2014.146
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For RFID mutual authentication security protocols which need back-end server have poor mobile performance, it cannot be applied to environments which have poor wireless network. The RFID mutual authentication security protocol based on key dispersion algorithm is designed in this paper, which proposes a new method for managing and distributing keys for a large number of tags. This protocol which does not need the backend database can be achieved security mutual authentication between the reader and the tag, the reader only need to store a pair of root keys, the key dispersal algorithms can disperse the corresponding mutual authentication keys with the tag identification number. Compared with the other of the same type RFID mutual authentication security protocols, results indicate that the proposed protocol in this paper has higher efficiency and security.
引用
收藏
页码:508 / 512
页数:5
相关论文
共 50 条
  • [1] Security Analysis of a Mutual Authentication Protocol for RFID Systems
    Yang, Yuanyuan
    Lu, Zhen
    Chen, Zhuo
    Wei, Xiang
    Gu, Jian
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 252 - 255
  • [2] Mutual Authentication Protocol for RFID Security using NFSR
    Suresh, T.
    Ramakrishnan, M.
    [J]. PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2015, : 255 - 259
  • [3] Design and Implementation of RFID Mutual Authentication Protocol
    Li, Hung-Lin
    Yuan, Ching-Chien
    Yen, Chia-Hao
    Huang, Yu-Jung
    Lin, Wei-Cheng
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 229 - 232
  • [4] Analysis and Design of Group RFID Tag Security Authentication Protocol
    Zang, Ke
    Xu, He
    Zhu, Feng
    Li, Peng
    [J]. COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2019), 2020, 993 : 637 - 645
  • [5] Mutual Authentication Security RFID Protocol Based on Time Stamp
    Zhang, Changlun
    Zhang, Wenqi
    Mu, Haibing
    [J]. 2015 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE THEORY, SYSTEMS AND APPLICATIONS (CCITSA 2015), 2015, : 166 - 170
  • [6] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    [J]. 2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105
  • [7] A Mutual Authentication Protocol for RFID
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-hao
    [J]. IT PROFESSIONAL, 2011, 13 (02) : 20 - 24
  • [8] Design and Analysis for RFID Authentication Protocol
    Zhang, Zhen
    Zhou, Shijie
    Luo, Zongwei
    [J]. PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, 2008, : 574 - +
  • [9] Design of RFID Mutual Authentication Protocol using Time Stamp
    Cho, Chang-Hyun
    Do, Kyoung-Hwa
    Kim, Jae-Woo
    Jun, Moon-Seog
    [J]. ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1047 - 1051
  • [10] Simple mutual authentication protocol for RFID
    Renault, Eric
    Bournerdassi, Selma
    [J]. TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, : 1252 - +