Back to Search
Start Over
Research on the Authentication of Radio Frequency Identification based on the Hash function
- Source :
- International Journal of Security and Its Applications. 9:209-216
- Publication Year :
- 2015
- Publisher :
- NADIA, 2015.
-
Abstract
- As a kind of accurate, rapid and real – time data acquisitions and processing technology, RFID can give unique identification to entity object, has been widely used in various industries, such as manufacturing, sales, transportation and so on. But with its widely application, many relevant problems, especially the safety issues of RFID system and the low cost issue of label have been raised more and more attention by people; therefore, a new and more appropriate security authentication protocol becomes necessary. In this paper, firstly introducing several now available security authentication protocols, and analyzing their strengths and drawbacks, then proposed a new authentication scheme based on Hash function, doing security properties and feasibility analysis of it in theory, and proving that the security properties of this scheme is more efficient, and it is more applicable to meet the needs of people through test at last.
- Subjects :
- Scheme (programming language)
Authentication
General Computer Science
business.industry
Computer science
Hash function
Authentication scheme
Object (computer science)
Computer security
computer.software_genre
Identification (information)
Radio-frequency identification
business
computer
Protocol (object-oriented programming)
computer.programming_language
Subjects
Details
- ISSN :
- 17389976
- Volume :
- 9
- Database :
- OpenAIRE
- Journal :
- International Journal of Security and Its Applications
- Accession number :
- edsair.doi...........5d666a7995301aaf60424f7cb0103388