TY - GEN
T1 - Research of RFID authentication protocol based on hash function
AU - Heng, Li
AU - Fei, Gao
AU - Yanming, Xue
AU - Shuo, Feng
PY - 2010
Y1 - 2010
N2 - The introduction of authentication protocols for RFID system provides the security to it, authentication protocol based on hash function is one of the most commonly used authentication protocol, which the hash function they used is a unilateral function, with a relatively high security, and it is easy to implement in the tag of RFID, so it has a wider application in RFID system. As the hash function, the characteristics of its own will have hash table conflicts, and thus would have resulted in security vulnerabilities, aim at the hash table conflict, this paper proposes a specific solution, and simulate the improved authentication protocol.
AB - The introduction of authentication protocols for RFID system provides the security to it, authentication protocol based on hash function is one of the most commonly used authentication protocol, which the hash function they used is a unilateral function, with a relatively high security, and it is easy to implement in the tag of RFID, so it has a wider application in RFID system. As the hash function, the characteristics of its own will have hash table conflicts, and thus would have resulted in security vulnerabilities, aim at the hash table conflict, this paper proposes a specific solution, and simulate the improved authentication protocol.
KW - Authentication protocol
KW - hash function
KW - hash table conflict
KW - improve protocol
UR - http://www.scopus.com/inward/record.url?scp=78651559438&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-14350-2_22
DO - 10.1007/978-3-642-14350-2_22
M3 - Conference contribution
AN - SCOPUS:78651559438
SN - 9783642143496
T3 - Lecture Notes in Electrical Engineering
SP - 177
EP - 182
BT - Advances in Wireless Networks and Information Systems
T2 - 2009 International Conference on Wireless Networks and Information Systems, WNIS 2009
Y2 - 28 December 2009 through 29 December 2009
ER -