Radio frequency identification (RFID) technology faces many security issues, and a detailed analysis of these security issues is conducted. It analyzes the existing RFID security authentication protocol and proposes a security authentication protocol that can effectively solve the problems of fraud, retransmission, tracking, and synchronization. In the continuous conversation mode of RFID, it uses the powerful computing power of the reader, the random number identification and comparison between the reader and the tag can resist the denial of service attack. To be able to resist desynchronization attacks, the back-end database stores tag identifiers and dynamically updates the data so that the tags and the background database maintain data synchronization. It utilizes the reader’s computing and storage functions to reduce the cost of tags, makes the agreement meet the requirements of low-cost, ensures two-way authentication, and improves the efficiency of the security authentication protocol.
CITATION STYLE
Sun, H., Li, P., Xu, H., & Zhu, F. (2019). An improvement RFID security authentication protocol based on hash function. In Advances in Intelligent Systems and Computing (Vol. 773, pp. 375–384). Springer Verlag. https://doi.org/10.1007/978-3-319-93554-6_35
Mendeley helps you to discover research relevant for your work.