• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Yue, Fan Kai. Ultra-Lightweight RFID Electronic Ticket Authentication Scheme in IoT[J]. Journal of Computer Research and Development, 2018, 55(7): 1432-1439. DOI: 10.7544/issn1000-1239.2018.20180075
Citation: Wang Yue, Fan Kai. Ultra-Lightweight RFID Electronic Ticket Authentication Scheme in IoT[J]. Journal of Computer Research and Development, 2018, 55(7): 1432-1439. DOI: 10.7544/issn1000-1239.2018.20180075

Ultra-Lightweight RFID Electronic Ticket Authentication Scheme in IoT

More Information
  • Published Date: June 30, 2018
  • With the increasing popularity of IoT application technologies, one of the key technologies, called the radio frequency identification (RFID) technology, has been applied to more and more application scenarios in various fields. The electronic tickets apply RFID technology to traditional tickets, which makes the traditional tickets have the characteristics of being storable and identifiable as well as verifiable, bringing a great deal of convenience and efficiency to people’s daily life. Although, RFID systems in the application of electronic tickets still face many potential security risks, such as privacy leakage. To solve the security problems in the application of electronic tickets, an ultra-lightweight RFID security authentication scheme is presented in this paper. Compared with some schemes that use complex cryptographic algorithms, this scheme adopts simple logic operation and timestamp synchronization upgrade mechanism, which can effectively resist asynchronous attack and replay attack, and besides it can effectively prevent information leakage. At the same time, the method that the time stamp matches the label information in the database in this scheme greatly improves the efficiency of information searching in database. Through the analysis of security and efficiency, and the performance comparison and simulation, the proposed scheme has higher security and efficiency than some existing schemes.
  • Related Articles

    [1]Gao Guangyong, Ji Chi, Xia Zhihua. Reversible Data Hiding in Color Encrypted Images Based on Color Channels Correlation and Entropy Coding[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202330880
    [2]Zhang Xiaojian, Shao Chao, Meng Xiaofeng. Accurate Histogram Release under Differential Privacy[J]. Journal of Computer Research and Development, 2016, 53(5): 1106-1117. DOI: 10.7544/issn1000-1239.2016.20150304
    [3]Zhao Huaxia, Yu Jing, Xiao Chuangbai. Night Color Image Enhancement via Optimization of Purpose and Improved Histogram Equalization[J]. Journal of Computer Research and Development, 2015, 52(6): 1424-1430. DOI: 10.7544/issn1000-1239.2015.20140067
    [4]Yang Chunfang, Liu Fenlin, and Luo Xiangyang. Histograms Difference and Quantitative Steganalysis of JPEG Steganography Based on Relative Entropy[J]. Journal of Computer Research and Development, 2011, 48(8): 1563-1569.
    [5]Yuan Guanglin, Xue Mogen, Han Yusheng, Zhou Pucheng. Mean Shift Object Tracking Based on Adaptive Multi-Features Fusion[J]. Journal of Computer Research and Development, 2010, 47(9): 1663-1671.
    [6]Liu Xiaomin and Zhang Yujin. Facial Expression Recognition Based on Gabor Histogram Feature and MVBoost[J]. Journal of Computer Research and Development, 2007, 44(7): 1089-1096.
    [7]Wang Xiangyang, Hu Fengli. An Efficient Color Image Retrieval Technique Based on Multi-Features of Bit-Plane[J]. Journal of Computer Research and Development, 2007, 44(5): 867-872.
    [8]Zhang Mingji, Wang Weiqiang, Zheng Qingfang, and Gao Wen. Adaptive Skin-Color Detection in Still Images[J]. Journal of Computer Research and Development, 2006, 43(9): 1674-1680.
    [9]Wang Yu, Meng Xiaofeng, Wang Shan. Using Histograms to Estimate the Selectivity of XPath Expression with Value Predicates[J]. Journal of Computer Research and Development, 2006, 43(2): 288-294.
    [10]Xing Qiang, Yuan Baozong, and Tang Xiaofang. A Fast Image Retrieval Method Based on Weighted Chromaticity Histogram[J]. Journal of Computer Research and Development, 2005, 42(11): 1903-1910.
  • Cited by

    Periodical cited type(7)

    1. 李学龄,柴雁欣,萧展辉,包新晔. 面向项目全生命周期的语义融合模型的构建. 自动化技术与应用. 2025(01): 173-176+184 .
    2. 王法胜,贺冰,孙福明,周慧. 自适应内容感知空间正则化相关滤波跟踪算法. 吉林大学学报(工学版). 2024(10): 3037-3049 .
    3. 吴捷,马小虎. 基于稀疏约束与双线索选择的目标跟踪算法. 火力与指挥控制. 2023(02): 19-25 .
    4. 姜文涛,张博强. 通道和异常适应性的目标跟踪算法. 计算机科学与探索. 2023(07): 1644-1657 .
    5. 张博. 基于残差神经网络的目标运动边界视觉快速跟踪算法. 探测与控制学报. 2023(03): 37-42+50 .
    6. 全震,吕静. 城市道路绿化结构信息高精度提取仿真. 计算机仿真. 2023(06): 216-219+337 .
    7. 姜文涛,崔江磊. 旋转区域提议网络的孪生神经网络跟踪算法. 计算机工程与应用. 2022(24): 247-255 .

    Other cited types(12)

Catalog

    Article views (1333) PDF downloads (376) Cited by(19)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return