• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.
Citation: Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.

Research on Hash-Based RFID Security Authentication Protocol

More Information
  • Published Date: April 14, 2009
  • Radio frequency identification (RFID) is a technique using radio frequency for object identification. It is regarded as one of the ten most important technologies of this century due to its celerity, real-time, veracity in collecting and processing information through unique identification. RFID can be widely used in manufacture, retail, logistics, transportation, medical treatment, national defence, etc. However, wireless transmission, broadcast of signals, resource-constraint, etc. bring some potential risks, which disturb the reliability of RFID system and block the deployment progress of RFID techniques. To prevent the security threats, based on the analysis of the security problem, two concepts of operation mode, the single session mode and the successive session mode, are proposed; and a Hash-based Security Authentication Protocol (HSAP) between tags and the back-end server for low-cost RFID system is designed. This protocol can prevent many security problems including spoofing attack, replay attack, tracking, as well as the problem of desynchronization. The formal proof of correctness of the proposed authentication protocol is given based on GNY logic. As only hash function and bitwise OR operation are required to be computed by tags, so the proposed strategy is very suitable for low-cost RFID system compared with previous works.
  • Related Articles

    [1]Yin Xiaokang, Lu Bin, Cai Ruijie, Zhu Xiaoya, Yang Qichao, Liu Shengli. Memory Copy Function Identification Technique with Control Flow and Data Flow Analysis[J]. Journal of Computer Research and Development, 2023, 60(2): 326-340. DOI: 10.7544/issn1000-1239.202110990
    [2]Yang Fan, Li Fei, Shu Jiwu. Survey on Secure Persistent Memory Storage[J]. Journal of Computer Research and Development, 2020, 57(5): 912-927. DOI: 10.7544/issn1000-1239.2020.20190820
    [3]Miao Dongjing, Liu Xianmin, Li Jianzhong. An Algorithm on Mining Approximate Functional Dependencies in Probabilistic Database[J]. Journal of Computer Research and Development, 2015, 52(12): 2857-2865. DOI: 10.7544/issn1000-1239.2015.20140685
    [4]Li Weibang, Li Zhanhuai, Chen Qun, Jiang Tao, Liu Hailong, Pan Wei. Functional Dependencies Discovering in Distributed Big Data[J]. Journal of Computer Research and Development, 2015, 52(2): 282-294. DOI: 10.7544/issn1000-1239.2015.20140229
    [5]Liu Xianmin, Li Jianzhong. Discovering Extended Conditional Functional Dependencies[J]. Journal of Computer Research and Development, 2015, 52(1): 130-140. DOI: 10.7544/issn1000-1239.2015.20130691
    [6]Xue Jinrong, An Qiusheng, Zheng Jun. Intent Reduction of Concept Lattice and Database Inference Dependence[J]. Journal of Computer Research and Development, 2014, 51(1): 96-103.
    [7]Zeng Kun and Yang Xuejun. A Best-Effort Hardware Transactional Memory Based on Dependency Graph[J]. Journal of Computer Research and Development, 2012, 49(1): 44-54.
    [8]Chen Chi, Feng Dengguo, and Xu Zhen. Research on Database Transaction Recovery Log and Intrusion Response[J]. Journal of Computer Research and Development, 2010, 47(10): 1797-1804.
    [9]Hao Zhongxiao, Li Yanjuan. Study on Membership Problem with Respect to Temporal Functional Dependencies and Temporal Multivalued Dependencies[J]. Journal of Computer Research and Development, 2006, 43(7): 1267-1272.
    [10]Lü Teng, Yan Ping. Functional Dependencies and Inference Rules for XML[J]. Journal of Computer Research and Development, 2005, 42(5): 792-796.

Catalog

    Article views (745) PDF downloads (652) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return