RFID mutual-authentication protocol with synchronous updatedkeys based on Hash function  

RFID mutual-authentication protocol with synchronous updatedkeys based on Hash function

在线阅读下载全文

作  者:Zhang Xiaohong Hu Yingmeng 

机构地区:[1]School of Information Engineering, Jiangxi University of Science and Technology

出  处:《The Journal of China Universities of Posts and Telecommunications》2015年第6期27-35,共9页中国邮电高校学报(英文版)

基  金:supported by the National Natural Science Foundation of China (11062002, 61363076);the Technology Project of Jiangxi Provincial Department of Education (GJJ14439, GJJ14465);the Natural Science Foundation of Jiangxi Province (20142BAB207020);the Innovation Fund for Graduate Students in Jiangxi Province (YC2014-S370)

摘  要:With the wide application of radio frequency identification (RFID) technology, its security privacy issues are becoming more and more prominent. A RFID mutual-authentication protocol with synchronous updated-keys based on Hash function is proposed to tackle those problems in this paper. An updated mechanism of the dynamic tag keys is introduced and a self-synchronized scheme is designed in the protocol, which has achieved the second verification for the tags. The security of the protocol is verified and analyzed by the Burrows-Abadi-Needham (BAN) logic and the attack models, moreover it has been compared with the existing schemes o'f security properties and its storage and computational performance. The results show that the proposed protocol has the ability to considerably reduce the amount of computation between tags and back-end database, and enhance the search efficiency of the whole system without the additional cost of the tags. It can satisfy safe requirements of RFID system effectively, also improve the authentication efficiency. The proposed protocol is more suitable for the low cost RFID system.With the wide application of radio frequency identification (RFID) technology, its security privacy issues are becoming more and more prominent. A RFID mutual-authentication protocol with synchronous updated-keys based on Hash function is proposed to tackle those problems in this paper. An updated mechanism of the dynamic tag keys is introduced and a self-synchronized scheme is designed in the protocol, which has achieved the second verification for the tags. The security of the protocol is verified and analyzed by the Burrows-Abadi-Needham (BAN) logic and the attack models, moreover it has been compared with the existing schemes o'f security properties and its storage and computational performance. The results show that the proposed protocol has the ability to considerably reduce the amount of computation between tags and back-end database, and enhance the search efficiency of the whole system without the additional cost of the tags. It can satisfy safe requirements of RFID system effectively, also improve the authentication efficiency. The proposed protocol is more suitable for the low cost RFID system.

关 键 词:RFID mutual-authentication protocol Hash function SYNCHRONIZATION BAN logic 

分 类 号:TN918.4[电子电信—通信与信息系统] TP391.44[电子电信—信息与通信工程]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象