RFID System Security Using Identity-Based Cryptography

被引:2
|
作者
Chen, Youqin [1 ]
Chen, Zhide [1 ]
Xu, Li [1 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou 350007, Fujian Province, Peoples R China
关键词
RFID; Secure Two-way Authentication Protocol; Learning Parity in the Presence of Noise; HB; HB+; HB++;
D O I
10.1109/IITSI.2010.52
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Two-way authentication is one of the key solutions to improve the security of RFID Tag/Reader due to many attacks on HB, HB+ and HB++. In this paper, we analysis HB, HB+ and HB++ and propose a modified protocol, a two-way authentication to avoid the attacks.
引用
收藏
页码:460 / 464
页数:5
相关论文
共 50 条
  • [41] Securing The Global Airspace System Via Identity-based Security
    Ivancic, William D.
    2015 IEEE/AIAA 34TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2015,
  • [42] Identity-based Cryptography for Securing Mobile Phone Calls
    Smith, Matthew
    Schridde, Christian
    Agel, Bjoern
    Freisleben, Bernd
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 365 - 370
  • [43] A Secure Email Encryption Proxy Based on Identity-based Cryptography
    Chen, Tieming
    Ma, Shilong
    2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 284 - 286
  • [44] Using mediated identity-based cryptography to support role-based access control
    Nali, D
    Adams, C
    Miri, A
    INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 245 - 256
  • [45] Identity-Based Cryptography on Hidden-Order Groups
    Lin, Chanlgu
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 2067 - 2071
  • [46] Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography
    Mehr, Kemal Adli
    Niya, Javad Musevi
    ETRI JOURNAL, 2015, 37 (03) : 512 - 522
  • [47] Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography
    Lee, BG
    Choi, DH
    Kim, HG
    Sohn, SW
    Park, KH
    ICT'2003: 10TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, VOLS I AND II, CONFERENCE PROCEEDINGS, 2003, : 597 - 603
  • [48] A Pairing-free Identity-based Cryptosystem Using Elliptic Curve Cryptography
    Ponpurmpoon, Poonsuk
    Hiranvanichakorn, Pipat
    International Journal of Network Security, 2022, 24 (04) : 695 - 706
  • [49] Using identity-based public-key cryptography with images to preserve privacy
    Pape, Sebastian
    Benamar, Nabil
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2008, : 299 - +
  • [50] A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography
    Zhang, Haibao
    Jiang, Wenbao
    Ding, Jin
    APPLIED SCIENCES-BASEL, 2025, 15 (01):