Research on RFID Security Authentication Protocol Based on HASH Function
نویسندگان
چکیده
منابع مشابه
Research and Design of RFID Security Authentication Protocol Based on Hash Function
This paper analyzes the rationality, completeness and security of HSASILC protocol. The results show that HSASILC protocol achieves the original design goals. The design protocol is compared with several typical protocols, and shows several advantages. The experimental environment is built and the protocol is verified. Using simulated RTL benchmarking sign level end design, simulation results s...
متن کاملForward Private RFID Authentication Protocol Based on Universal Hash Function
Privacy of RFID systems is receiving increasing attention with the progress of Internet of Things. There are a number of challenges in providing privacy and security in the RFID tag due to the limited computation ability of low-cost RFID tags. Many research works have already been conducted using hash functions and pseudorandom numbers to design the RFID protocol. But few of them involve the de...
متن کاملResearch of RFID Certification Security Protocol based on Hash Function and DES Algorithm
RFID has been more and more attention and application by people, but the existence of security and privacy problems worthy of attention is concern. The certification process analysis of several typical security protocols is based on existing RFID authentication protocol. It proposed an improved bidirectional authentication algorithm. The use of one-way HASH function can solve the security probl...
متن کاملAnother Fallen Hash-Based RFID Authentication Protocol
In this paper, we scrutinize the security of an RFID protocol [9], which has been recently proposed, and show important vulnerabilities. Our first attack is a passive one that can disclose all secret information stored on the tags’ memory. We only need to eavesdrop one session of the protocol between a tag and a legitimate reader (connected to the back-end database) and perform O(217) off-line ...
متن کاملSecurity Analysis on RFID Mutual Authentication Protocol
Radio frequency identification (RFID) has received much attention both in industry and academia in recent years. To this extent, the international standards group, ISO/IEC JTC 1/SC 31, is in the midst of standardization activity to define the security extension to the EPCglobal Generation 2 (Gen2) ultra high frequency (UHF) air interface protocols for secure RFID communications. In this paper, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: DEStech Transactions on Engineering and Technology Research
سال: 2018
ISSN: 2475-885X
DOI: 10.12783/dtetr/ecar2018/26353