An improvement RFID security authentication protocol based on hash function

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Radio frequency identification (RFID) technology faces many security issues, and a detailed analysis of these security issues is conducted. It analyzes the existing RFID security authentication protocol and proposes a security authentication protocol that can effectively solve the problems of fraud, retransmission, tracking, and synchronization. In the continuous conversation mode of RFID, it uses the powerful computing power of the reader, the random number identification and comparison between the reader and the tag can resist the denial of service attack. To be able to resist desynchronization attacks, the back-end database stores tag identifiers and dynamically updates the data so that the tags and the background database maintain data synchronization. It utilizes the reader’s computing and storage functions to reduce the cost of tags, makes the agreement meet the requirements of low-cost, ensures two-way authentication, and improves the efficiency of the security authentication protocol.

Cite

CITATION STYLE

APA

Sun, H., Li, P., Xu, H., & Zhu, F. (2019). An improvement RFID security authentication protocol based on hash function. In Advances in Intelligent Systems and Computing (Vol. 773, pp. 375–384). Springer Verlag. https://doi.org/10.1007/978-3-319-93554-6_35

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free