Research of RFID authentication protocol based on hash function

Li Heng*, Gao Fei, Xue Yanming, Feng Shuo

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The introduction of authentication protocols for RFID system provides the security to it, authentication protocol based on hash function is one of the most commonly used authentication protocol, which the hash function they used is a unilateral function, with a relatively high security, and it is easy to implement in the tag of RFID, so it has a wider application in RFID system. As the hash function, the characteristics of its own will have hash table conflicts, and thus would have resulted in security vulnerabilities, aim at the hash table conflict, this paper proposes a specific solution, and simulate the improved authentication protocol.

Original languageEnglish
Title of host publicationAdvances in Wireless Networks and Information Systems
Pages177-182
Number of pages6
DOIs
Publication statusPublished - 2010
Event2009 International Conference on Wireless Networks and Information Systems, WNIS 2009 - Shanghai, China
Duration: 28 Dec 200929 Dec 2009

Publication series

NameLecture Notes in Electrical Engineering
Volume72 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference2009 International Conference on Wireless Networks and Information Systems, WNIS 2009
Country/TerritoryChina
CityShanghai
Period28/12/0929/12/09

Keywords

  • Authentication protocol
  • hash function
  • hash table conflict
  • improve protocol

Fingerprint

Dive into the research topics of 'Research of RFID authentication protocol based on hash function'. Together they form a unique fingerprint.

Cite this