Application of Random Data in RFID Secure Communication

Article Preview

Abstract:

With the development of the supply chain industry, the application environment has become increasingly complex, and the security demands in RFID communication are also increasing. This paper analyzes the problems and security requirements of node authentication, message accuracy and privacy protection, etc., proposes an RFID secure communication algorithm based on random numbers describing the algorithm for nodes query generation and node processing forwards. Experimental results show that the proposed algorithm has higher accuracy.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3680-3682

Citation:

Online since:

August 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Henrici D. RFID Security and Privacy: Concepts, Protocols, and Architectures (Lecture Notes in Electrical Engineering)[M]. Springer Publishing Company, Incorporated, (2008).

Google Scholar

[2] Wu Zhenjiang Zhou Yanwei, Ma Jianfeng. Iot security transmission model [J]. Journal of computers, 2011, 34 (8) : 1351-1352.

Google Scholar

[3] sail, Sun Xuan Ma Jianfeng, etc. Under the environment of supply chain universal composable security of RFID communication protocol [J]. Journal of computers, 2008, 31 (10) : 1754-1767.

DOI: 10.3724/sp.j.1016.2008.01754

Google Scholar

[4] Yang Jinguo. PKI technology in the application of RFID data security [J]. Computer engineering and design, 2007, 28 (21) : 5285-5288.

Google Scholar

[5] XinWei Sun Huiping, Chen Zhong. The analysis and design of the RFID distance constraint agreement [J]. Journal of computer research and development, 2013, 50 (11) : 2358-2366.

Google Scholar