Research on RFID Multi-Authentication Protocol Based on Hash Function

Article Preview

Abstract:

To address the security problems caused by the fake readers, and the weakness of low authentication protocol efficiency, a new RFID security authentication protocol based on Hash function is proposed. The security ability of the protocol is compared with other protocols' and is proved by doing the formal analysis. The theoretical analysis and formal proof is presented to prove the security ability of the protocol. Consequently, the result showed that the new protocol could protect the data privacy, achieve the data synchronization, prevent the tag from location tracking, avoid information reproduction, prevent clone and counterfeit and possess forward security ability which was useful for low-cost tags.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2403-2407

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Lee S. Mutual authentication of RFID system using synchronized secret information[D]. Cambridge, MA: MIT, 2003: 13-20.

Google Scholar

[2] Rhee K, KwakJ, Kim S. Challenge-response based RFID authentication protocol for distributed database environment[C]/Proceedings of the 2nd International Conference on Security in Pervasive Computing.Berlinl Springer, 2005: 70-84.

DOI: 10.1007/978-3-540-32004-3_9

Google Scholar

[3] Ma Qiaomei. An Improved RFID Authentication Protocol Based on Hash-Chain[J]. Network Security Technology & Application, 2012, (7).

Google Scholar

[4] Hyunsung Kim. Desynchronization Attack on Hash-based RFID Mutual Authentication Protocol[J]. Journal of Security Engineering, 2012, 25(8): 357-366.

Google Scholar

[5] KOU Hong-zhao, ZHANG Zi-nan. RFID Mutual Authentication Based on Physical Unclonable Function[J]. Computer Engineering, 2013, No. 6.

Google Scholar