中国邮电高校学报(英文) ›› 2016, Vol. 23 ›› Issue (2): 31-37.doi:

• Wireless • 上一篇    下一篇

Research on a provable security RFID authentication protocol based on Hash function

于银辉1,张磊2   

  1. 1. 吉林大学通信工程学院通信工程专业
    2. 吉林大学通信工程学院
  • 收稿日期:2015-09-08 修回日期:2016-03-21 出版日期:2016-04-28 发布日期:2016-04-28
  • 通讯作者: 张磊 E-mail:leizhang14@mails.jlu.edu.cn
  • 基金资助:

    国家重点基础研究发展计划(973计划)

Research on a provable security RFID authentication protocol based on Hash function

  • Received:2015-09-08 Revised:2016-03-21 Online:2016-04-28 Published:2016-04-28
  • Supported by:

    Supported by 973 Program under Grant No. 2015CB453000

摘要: Research on existing radio frequency identification (RFID) authentication protocols security risks, poor performance and other problems, a RFID security authentication protocol based on dynamic identification (ID) and Key value renewal is proposed. Meanwhile, the security problems based on Hash function RFID security authentication protocol in recent years have been also sorted and analyzed. Then a security model to design and analyze RFID protocols is built. By using the computational complexity, its correctness and security have been proved. Compared with the safety performance, storage overhead, computational overhead and other aspects of other protocols, the protocol for RFID has more efficient performance and ability to withstand various attacks. And the C# programming language is used to simulate the authentication process on the visual studio platform, which verifies the feasibility of the protocol.

关键词: mutual authentication protocol, provable security method, Hash function, RFID system

Abstract: Research on existing radio frequency identification (RFID) authentication protocols security risks, poor performance and other problems, a RFID security authentication protocol based on dynamic identification (ID) and Key value renewal is proposed. Meanwhile, the security problems based on Hash function RFID security authentication protocol in recent years have been also sorted and analyzed. Then a security model to design and analyze RFID protocols is built. By using the computational complexity, its correctness and security have been proved. Compared with the safety performance, storage overhead, computational overhead and other aspects of other protocols, the protocol for RFID has more efficient performance and ability to withstand various attacks. And the C# programming language is used to simulate the authentication process on the visual studio platform, which verifies the feasibility of the protocol.

Key words: mutual authentication protocol, provable security method, Hash function, RFID system

中图分类号: