Research and Design of RFID Security Authentication Protocol Based on Hash Function
نویسنده
چکیده
This paper analyzes the rationality, completeness and security of HSASILC protocol. The results show that HSASILC protocol achieves the original design goals. The design protocol is compared with several typical protocols, and shows several advantages. The experimental environment is built and the protocol is verified. Using simulated RTL benchmarking sign level end design, simulation results show that the protocol is feasible, reasonable, safe and low cost, which lays a solid foundation for the application of the protocol in practice. A security and privacy protection scheme using Hash function bidirectional authentication protocol is proposed. We then use BAN logic to prove the improved protocol. Finally, according to the improved scheme, the process of mutual authentication between reader and tag is simulated in My Eclipse6.0+JDK1.6 environment.
منابع مشابه
HMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملAn Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System
Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, ...). Our work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms ...
متن کاملRFID authentication protocol design via BAN logic
Tag cost and privacy of RFID technology are two main factors that determine whether it will be applied to Internet of Things on a large scale. Recently, RFID industry and research community have focused on RFID authentication protocols with provable privacy and low tag cost. In this paper, we propose an RFID security protocol that achieves all security requirements based on a hash function and ...
متن کاملForward Private RFID Authentication Protocol Based on Universal Hash Function
Privacy of RFID systems is receiving increasing attention with the progress of Internet of Things. There are a number of challenges in providing privacy and security in the RFID tag due to the limited computation ability of low-cost RFID tags. Many research works have already been conducted using hash functions and pseudorandom numbers to design the RFID protocol. But few of them involve the de...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017