Journal of Guangdong University of Technology ›› 2014, Vol. 31 ›› Issue (3): 62-66.doi: 10.3969/j.issn.1007-7162.2014.03.011

• Comprehensive Studies • Previous Articles     Next Articles

An Improved RFID Mutual Authentication Protocol Based on Hash Function

Xie Jin-biao, Ou Yu-yi, Ling Jie   

  1. School of Computers, Guangdong University of Technology, Guangzhou 510006, China
  • Received:2014-04-14 Online:2014-09-30 Published:2014-09-30

Abstract: In view of the existing defects of RFID authentication protocol, based on the Hash function, and the low efficiency of the security protocol authentication in the application of the Internet of Things,  it proposed an improved RFID security mutual authentication protocol, based on the Hash function. This protocol can protect data privacy, and prevent replay attack, privacy track, and spoofing attack. Compared with other protocols of this kind in security and performance, this protocol, which uses Label certification mark Tuse, Tstore and dynamic secret value S, can prevent desynchronization attack, has higher efficiency, and is suitable for low-cost RFID systems.

Key words: Internet of Things, Hash function, radio frequency , identification(RFID), security authentication, protocol security

[1] Jin Heng-yue, Ma Jian-guo. Internet-of-Things for “Made in China 2025”: The Trends and Technology Challenges [J]. Journal of Guangdong University of Technology, 2018, 35(03): 10-17.
[2] XIE Guo-Bo, GUO Long. Security Protocol of RFID Based on Double Private Key Elliptic Curve Cryptography [J]. Journal of Guangdong University of Technology, 2015, 32(3): 34-38.
[3] LI Zheng, FENG Yong-Jin, JIANG Zhi-Wen. Power Efficient Bimodal Electronic Shelf Label System [J]. Journal of Guangdong University of Technology, 2014, 31(3): 124-129.
[4] FENG Yong-Jin, LI Zheng, ZHANG Hai-Xiao. Sleep Method of Wireless Electronic Shelf Labels Using Relative Time [J]. Journal of Guangdong University of Technology, 2014, 31(3): 130-136.
[5] LI Zhi-Ke, LIU Zhu-Song. A Method of RFID Tag Data Validation and Recovery Based on Cloud Storage Technology [J]. Journal of Guangdong University of Technology, 2014, 31(3): 137-142.
[6] Huang Ling. A Study of the Highway Shockwave Elimination Method Based on the Internet of Things [J]. Journal of Guangdong University of Technology, 2013, 30(1): 45-49.
[7] Deng Jie,Cheng Liang-lun. An Improved Anti-collision Algorithm Based on Binary Search Algovithm in the RFID System [J]. Journal of Guangdong University of Technology, 2009, 26(3): 72-76.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!