A More Accurate and Stable Batch Authentication Protocol for Large-Scale RFID Systems

Author(s):  
Zhenguo Gao ◽  
Haijun Wang ◽  
Liling Fan ◽  
Yan Chen ◽  
Scott Chih-Hao Huang ◽  
...  
2019 ◽  
Vol 8 (4) ◽  
pp. 1272-1275 ◽  
Author(s):  
Binbin Li ◽  
Wenyuan Liu ◽  
Lin Wang

2012 ◽  
Vol 512-515 ◽  
pp. 2603-2606
Author(s):  
Jie Chen ◽  
Yue Yu Zhang ◽  
Yu Pu Hu

Combined electric vehicles with smart grid, Vehicle-to-Grid (V2G) resolve the problem of charging large-scale electric vehicles, and make vehicles as mobile and distributed storage unit accessing to smart grid. V2G requires more efficient authentication protocol to meet fast response and information processing in real-time. Batch authentication can provide large computational savings when several signatures are verified together, which is appropriate for aggregators to verify PHEVs/PEVs. This paper proposes a modified batch authentication protocol based on hybrid cryptography, which takes advantage of public key cryptology to identity authentication and transmit shared session key. Furthermore, the comparison and analysis of the modified with existing batch authentication in V2G are given.


Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


Author(s):  
Amir-Hamed Mohsenian-Rad ◽  
Vahid Shah-Mansouri ◽  
Vincent W. S. Wong ◽  
Robert Schober
Keyword(s):  

Author(s):  
Chu Chu ◽  
Jianyu Niu ◽  
Wenxian Zheng ◽  
Jian Su ◽  
Guangjun Wen

Sign in / Sign up

Export Citation Format

Share Document