Improved An RFID Mutual Authentication Protocol Based on Hash Function
نویسندگان
چکیده
منابع مشابه
Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems
In the last decade RFID technology has become widespread. It can be found in various fields of our daily life. Due to the rapid development more and more security problems were raised. Since tags have limited memory and very low computational capacity a so-called lightweight authentication is needed. Several protocols have been proposed to resolve security and privacy issues in RFID systems. Ho...
متن کاملAn One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol
With the widespread development of RFID technology, security and privacy issues become more prominent in RFID applications. In this paper, a new oneway hash function based mutual authentication protocol is proposed to address such security and privacy problems. Particularly, access list and pseudorandom flags are adopted for quick search, to ensure good efficiency and scalability. The proposed ...
متن کاملForward Private RFID Authentication Protocol Based on Universal Hash Function
Privacy of RFID systems is receiving increasing attention with the progress of Internet of Things. There are a number of challenges in providing privacy and security in the RFID tag due to the limited computation ability of low-cost RFID tags. Many research works have already been conducted using hash functions and pseudorandom numbers to design the RFID protocol. But few of them involve the de...
متن کاملAn Efficient Improvement on Safkhani et al.’s Hash-Based Mutual Authentication Protocol for RFID Systems
Nowadays, plenty of radio frequency identification (RFID) systems have been proposed and used in the real world for convenience. An RFID system requires advanced properties of confidentiality, indistinguishability, forward security and mutual authentication to provide a higher security level. Safkhani et al. proposed a hash-based authentication protocol for RFID systems. Though their protocol p...
متن کاملAn Improved Hash Function Based on the Tillich-Zémor Hash Function
Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem. Also, it is secure against the known attacks. It is the most secure variant of the Tillich-Zémor hash function until now.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Korean Institute of Communications and Information Sciences
سال: 2012
ISSN: 1226-4717
DOI: 10.7840/kics.2012.37c.3.241