RFID Bi-directional Authentication Protocol Based on Random Number and Hash Function

被引:0
|
作者
Liu Jian-dong [1 ]
Wang Ye-quan [1 ]
Zhang Xiao [1 ]
Shang Kai [1 ]
机构
[1] Beijing Inst Petrochem Technol, Sch Informat Engn, Beijing 102617, Peoples R China
关键词
RFID; Random number; Hash function; authentication protocol;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
On the basis of the analysis of commonly used RFID authentication protocols' shortcomings, this paper proposes a random number and hash function based RFID bi-directional authentication protocol. This protocol can resolve eavesdropping, illegal access, location tracking, impersonation and replay attack.
引用
收藏
页码:919 / 922
页数:4
相关论文
共 50 条
  • [1] RFID Bi-Directional Authentication Protocol Based on Dynamic Coupled Integer Tent Map
    Liu Jiandong
    Zhang Xiao
    Wang Yequan
    Shang Kai
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (03): : 369 - 381
  • [2] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [3] Research on RFID Security Authentication Protocol Based on HASH Function
    Chen, Zhen-huan
    Pan, Xue-feng
    2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255
  • [4] An Improvement RFID Security Authentication Protocol Based on Hash Function
    Sun, Haowen
    Li, Peng
    Xu, He
    Zhu, Feng
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 375 - 384
  • [5] Mobile RFID Mutual Authentication Protocol Based on Hash Function
    Yu, Wenjin
    Jiang, Yixiang
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 358 - 361
  • [6] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    The Journal of China Universities of Posts and Telecommunications, 2016, (02) : 31 - 37
  • [7] Forward private RFID authentication protocol based on universal hash function
    Gao, S. (shujing_g@126.com), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (10):
  • [8] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2016, 23 (02) : 31 - 37
  • [9] Research on a provable security RFID authentication protocol based on Hash function
    Yinhui, Yu (yuyh@jlu.edu.cn), 2016, Beijing University of Posts and Telecommunications (23):
  • [10] Lightweight RFID Bidirectional Authentication Protocol Based on Improved Hash Function
    Cao, Fang-Ming
    He, Xiao-Ping
    International Journal of Network Security, 2024, 26 (01) : 98 - 105