Research on the authentication of radio frequency identification based on the hash function

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

As a kind of accurate, rapid and real - time data acquisitions and processing technology, RFID can give unique identification to entity object, has been widely used in various industries, such as manufacturing, sales, transportation and so on. But with its widely application, many relevant problems, especially the safety issues of RFID system and the low cost issue of label have been raised more and more attention by people; therefore, a new and more appropriate security authentication protocol becomes necessary. In this paper, firstly introducing several now available security authentication protocols, and analyzing their strengths and drawbacks, then proposed a new authentication scheme based on Hash function, doing security properties and feasibility analysis of it in theory, and proving that the security properties of this scheme is more efficient, and it is more applicable to meet the needs of people through test at last.

Cite

CITATION STYLE

APA

Zhi, B., & Yi-Gang, H. (2015). Research on the authentication of radio frequency identification based on the hash function. International Journal of Security and Its Applications, 9(6), 209–216. https://doi.org/10.14257/ijsia.2015.9.6.20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free