RFID authentication protocol resistant to the man-in-the-middle attack

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

HB+ family protocols that based on LPN problem are effective and well suited for the Internet of Things. However, the HB+ family protocols have vulnerability on the man-in-the-middle attack. In this paper, we propose a new privacy preserving RFID authentication protocol based on the multiplication on (formula presented). By analyzing the differential property on (formula presented), we show that the protocol is resistant to the man-inthe- middle attack. Moreover, the performance analysis shows the protocol meets the demands of the large-scale RFID systems.

Cite

CITATION STYLE

APA

Zhai, L., & Wu, C. (2015). RFID authentication protocol resistant to the man-in-the-middle attack. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 153, pp. 41–47). Springer Verlag. https://doi.org/10.1007/978-3-319-23802-9_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free