HB+ family protocols that based on LPN problem are effective and well suited for the Internet of Things. However, the HB+ family protocols have vulnerability on the man-in-the-middle attack. In this paper, we propose a new privacy preserving RFID authentication protocol based on the multiplication on (formula presented). By analyzing the differential property on (formula presented), we show that the protocol is resistant to the man-inthe- middle attack. Moreover, the performance analysis shows the protocol meets the demands of the large-scale RFID systems.
CITATION STYLE
Zhai, L., & Wu, C. (2015). RFID authentication protocol resistant to the man-in-the-middle attack. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 153, pp. 41–47). Springer Verlag. https://doi.org/10.1007/978-3-319-23802-9_6
Mendeley helps you to discover research relevant for your work.