RFID System Security Using Identity-Based Cryptography

被引:2
|
作者
Chen, Youqin [1 ]
Chen, Zhide [1 ]
Xu, Li [1 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou 350007, Fujian Province, Peoples R China
关键词
RFID; Secure Two-way Authentication Protocol; Learning Parity in the Presence of Noise; HB; HB+; HB++;
D O I
10.1109/IITSI.2010.52
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Two-way authentication is one of the key solutions to improve the security of RFID Tag/Reader due to many attacks on HB, HB+ and HB++. In this paper, we analysis HB, HB+ and HB++ and propose a modified protocol, a two-way authentication to avoid the attacks.
引用
收藏
页码:460 / 464
页数:5
相关论文
共 50 条
  • [31] A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Huang, Yuzhou
    Xia, Fei
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 90 - 95
  • [32] An Identity-based Cryptography Scheme Based on FullIdent Algorithm
    Xie Yumin
    Kamran, Muhammad
    JOURNAL OF COMPUTERS, 2014, 9 (11) : 2691 - 2696
  • [33] A Survey of Identity-based and Attribute-based Cryptography
    QI ZhenghuaYANG GengREN XunyiCollege of ComputerNanjing University of Posts and TelecommunicationsNanjing China
    南京邮电大学学报(自然科学版), 2010, 30 (01) : 11 - 17
  • [34] ARIBC: Online Reporting Based on Identity-Based Cryptography
    Goudosis, Athanasios
    Katsikas, Sokratis
    FUTURE INTERNET, 2021, 13 (02): : 1 - 17
  • [35] A Secure Topology Control Mechanism for SDWSNs Using Identity-Based Cryptography
    Wang, Rui
    Liu, Donglan
    Chen, Jianfei
    Ma, Lei
    Liu, Xin
    Zhang, Hao
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT I, 2020, 12384 : 469 - 481
  • [36] QUANTUM-SAFE IDENTITY-BASED BROADCAST ENCRYPTION WITH PROVABLE SECURITY FROM MULTIVARIATE CRYPTOGRAPHY
    Sarkar, Ramprasad
    Mandal, Mriganka
    Mukhopadhyay, Sourav
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2024, 18 (03) : 814 - 827
  • [37] SECURING THE GLOBAL AIRSPACE SYSTEM VIA IDENTITY-BASED SECURITY
    Ivancic, William D.
    2015 IEEE/AIAA 34TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2015,
  • [38] EIBC: Enhanced Identity-Based Cryptography, a Conceptual Design
    Nicanfar, Hasen
    Leung, Victor C. M.
    2012 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2012, : 179 - 185
  • [39] Toward hierarchical identity-based cryptography for tactical networks
    Matt, BJ
    MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 727 - 735
  • [40] Securing Mobile Phone Calls with Identity-Based Cryptography
    Smith, Matthew
    Schridde, Christian
    Agel, Bjoern
    Freisleben, Bernd
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 210 - 222