RFID security authentication protocol based on Hash for the lightweight RFID systems

Author(s):  
Hong He ◽  
Qi LI ◽  
Zhi-Hong Zhang
2013 ◽  
Vol 336-338 ◽  
pp. 1882-1886
Author(s):  
Tian Fu ◽  
Zhen Wang ◽  
Pan Deng Yang

With the gradual application of RFID technology, the problems of privacy security arouse people's great attention. To address the problems of the existing RFID authentication protocol, such as the weakness on security and privacy, the high cost and the un-stabilizing systems performance, this paper puts forward a kind effective protection of privacy and low cost RFID security authentication protocol, analyses the security and performance of this protocol. This protocol can not only effectively solve the problems of replay attacks, location privacy attack and data synchronization, but also greatly use the Reader computing resources to reduce the cost of system construction, so it is appropriate for the application of RFID system.


2013 ◽  
Vol 846-847 ◽  
pp. 1524-1530
Author(s):  
Lin Huo ◽  
Yi Lin Jiang ◽  
Liang Qing Hu

Because RFID does not require line of sight communication, low-cost and efficient operation with these outstanding advantages RFID are being widely used, followed by privacy and security vulnerabilities and other issues. Afterdescribe and analysis the facing security issues and the existing security protocols on the stage, proposed a low-cost RFID security authentication protocol based on hash function, this protocol use hash function and random numbers to ensure the safe and efficient control access between the tags and readers,and from the perspective of quantitative estimates the cost of tag. After setting up the idealized protocol model,by using the BAN logic formal analysis this protocol , and prove the security of protocol theoretically .


2013 ◽  
Vol 380-384 ◽  
pp. 2831-2836
Author(s):  
Hong He ◽  
Qi Li ◽  
Zhi Hong Zhang

In order to solve the RFID authentication protocols, a new mutual authentication protocol based on Hash for the lightweight RFID system is proposed in this paper. Compared with several RFID authentication protocols with the similar structure, the proposed protocol can effectively solve the privacy and security of the RFID system, and it has significant performance advantages. It greatly reduces the amount storage and computation of tags.


Sign in / Sign up

Export Citation Format

Share Document