A secure authentication method based on hash function for RFID system

Limited by the tag chip resource of a radio-frequency identification (RFID) system,the data and information security has been an important issue of an RFID system.The one-way Hash function provides an efficient and reliable approach for the identification and authentication of the RFID system.Based...

Full description

Saved in:
Bibliographic Details
Main Authors: Chuan LI, Xuejun LI
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2017-06-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017108/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530140837806080
author Chuan LI
Xuejun LI
author_facet Chuan LI
Xuejun LI
author_sort Chuan LI
collection DOAJ
description Limited by the tag chip resource of a radio-frequency identification (RFID) system,the data and information security has been an important issue of an RFID system.The one-way Hash function provides an efficient and reliable approach for the identification and authentication of the RFID system.Based on the analysis of several typical Hash authentication protocols,a novel secure authentication protocol based on the Hash function was proposed.The protocol was intended to tackle the identification among the handheld RFID reader,tags and server.Specifically,the protocol utilizes the Hash function to achieve the mutual authentication between the above three objects.The performance analysis shows that the proposed protocol can resist the most known attacks with reduced storage capacity and lower computation overhead.Therefore,the proposed strategy effectively ensures the data and privacy security of the RFID system,achieving the bidirectional anonymous authentication between the terminal and server,which is very suitable for the distributed large-scale RFID system.
format Article
id doaj-art-7a51e2c819964e908ef1e86c688029c0
institution Kabale University
issn 1000-0801
language zho
publishDate 2017-06-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-7a51e2c819964e908ef1e86c688029c02025-01-15T03:12:45ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012017-06-013312913759601941A secure authentication method based on hash function for RFID systemChuan LIXuejun LILimited by the tag chip resource of a radio-frequency identification (RFID) system,the data and information security has been an important issue of an RFID system.The one-way Hash function provides an efficient and reliable approach for the identification and authentication of the RFID system.Based on the analysis of several typical Hash authentication protocols,a novel secure authentication protocol based on the Hash function was proposed.The protocol was intended to tackle the identification among the handheld RFID reader,tags and server.Specifically,the protocol utilizes the Hash function to achieve the mutual authentication between the above three objects.The performance analysis shows that the proposed protocol can resist the most known attacks with reduced storage capacity and lower computation overhead.Therefore,the proposed strategy effectively ensures the data and privacy security of the RFID system,achieving the bidirectional anonymous authentication between the terminal and server,which is very suitable for the distributed large-scale RFID system.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017108/RFIDhash functionsecurityauthentication protocol
spellingShingle Chuan LI
Xuejun LI
A secure authentication method based on hash function for RFID system
Dianxin kexue
RFID
hash function
security
authentication protocol
title A secure authentication method based on hash function for RFID system
title_full A secure authentication method based on hash function for RFID system
title_fullStr A secure authentication method based on hash function for RFID system
title_full_unstemmed A secure authentication method based on hash function for RFID system
title_short A secure authentication method based on hash function for RFID system
title_sort secure authentication method based on hash function for rfid system
topic RFID
hash function
security
authentication protocol
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017108/
work_keys_str_mv AT chuanli asecureauthenticationmethodbasedonhashfunctionforrfidsystem
AT xuejunli asecureauthenticationmethodbasedonhashfunctionforrfidsystem
AT chuanli secureauthenticationmethodbasedonhashfunctionforrfidsystem
AT xuejunli secureauthenticationmethodbasedonhashfunctionforrfidsystem