期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A novel secure group RFID authentication protocol 被引量:3
1
作者 GUO Cong ZHANG Zi-jian +2 位作者 ZHU Lie-huang TAN Yu-an YANG Zhen 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第1期94-103,共10页
The trend of researching group radio frequency identification devices(RFID) authentication protocol has become increasingly popular in recent years. One of the newest work in this area is from Batina and Lee, they p... The trend of researching group radio frequency identification devices(RFID) authentication protocol has become increasingly popular in recent years. One of the newest work in this area is from Batina and Lee, they presented a privacy-preserving multi-players grouping-proof protocol based on the elliptic curve cryptography(ECC), and claimed their protocol have the ability to resist five potential attacks, including compromised tag attack, man-in-the-middle attack, colluding tags attack, etc. In this paper, we first take a counterexample to demonstrate their protocol is vulnerable to compromised tag attack. Then we propose a novel secure RFID authentication protocol, and analyze its security by merging formal analysis, provable security, and mathematical inductive method, so as to solve the weakness of Batina and Lee's work. Furthermore, compared with another two classic protocols(secure ownership transfer protocol(SOTP) and secure multiple group ownership transfer protocol(SMGOTP)), the performance analysis show that our protocol provides not only a lower tags' communication cost at about 50.0% and 14.3%, but also a lower reader's computation cost(approximate 14.5% and 55.1% respectively), when transferring a large number of tags. 展开更多
关键词 group rfid authentication compromised attack elliptic curve rfid internet of things(IOT)
原文传递
Research on a provable security RFID authentication protocol based on Hash function 被引量:4
2
作者 Yu Yinhui Zhang Lei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第2期31-37,共7页
Research on existing radio frequency identification(RFID) authentication protocols security risks, poor performance and other problems, a RFID security authentication protocol based on dynamic identification(ID) a... Research on existing radio frequency identification(RFID) authentication protocols security risks, poor performance and other problems, a RFID security authentication protocol based on dynamic identification(ID) and Key value renewal is proposed. Meanwhile, the security problems based on Hash function RFID security authentication protocol in recent years have been also sorted and analyzed. Then a security model to design and analyze RFID protocols is built. By using the computational complexity, its correctness and security have been proved. Compared with the safety performance, storage overhead, computational overhead and other aspects of other protocols, the protocol for RFID has more efficient performance and ability to withstand various attacks. And the C# programming language is used to simulate the authentication process on the visual studio platform, which verifies the feasibility of the protocol. 展开更多
关键词 mutual authentication protocol provable security method Hash function rfid system
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部