scholarly journals Mutual authentication protocols for RFID systems

2008 ◽  
Vol 5 (4) ◽  
pp. 348-365 ◽  
Author(s):  
Ashrar A. Omer ◽  
Johnson P. Thomas ◽  
Ling Zhu
2013 ◽  
Vol 380-384 ◽  
pp. 2831-2836
Author(s):  
Hong He ◽  
Qi Li ◽  
Zhi Hong Zhang

In order to solve the RFID authentication protocols, a new mutual authentication protocol based on Hash for the lightweight RFID system is proposed in this paper. Compared with several RFID authentication protocols with the similar structure, the proposed protocol can effectively solve the privacy and security of the RFID system, and it has significant performance advantages. It greatly reduces the amount storage and computation of tags.


2014 ◽  
Vol 543-547 ◽  
pp. 2255-2261
Author(s):  
Bing Zhang ◽  
Zhi Guang Qin ◽  
Guo Gen Wan ◽  
Xin Xin Ma

This document analyzes the security drawback of the Hash-based algorithm authentication protocols which is frequently used in low-cost RFID systems, and proposes a lightweight mutual authentication protocol. In the proposed protocol, all authenticated information is encrypted , the location privacy is also provided by refreshing an identifier of a tag in each session and lost massages can be recovered from many attacks such as spoofing attacks. The comparison result of the simulation experiment and the formal correctness proof of the proposed authentication protocol is based on BAN logic. It shows that the proposed protocol in this article greatly enhance the capability of verifiability, confidentiality and integrality, it also corrects the existing Hash-based protocol secure deficiency so that it is more suitable for low-cost RFID systems than those existing ones.


2014 ◽  
Vol 989-994 ◽  
pp. 2349-2355
Author(s):  
Kang Kang Chen ◽  
Chen Lei Cao ◽  
Jian Yi Liu ◽  
Ru Zhang

In Recent years, the rapid development of cloud computing promotes the technological innovation. In the meantime, the security of cloud attracts many researchers. In this paper, a security architecture is proposed to provide a trust communication mechanism between entities in the cloud. Based on this security architecture and BFIBE, three security protocols are proposed to implement mutual authentication and key agreement, which can resist man-in-middle attacks and masquerading attacks. Besides, based the three protocols, an effective data sharing method is proposed.


Sign in / Sign up

Export Citation Format

Share Document