Research of RFID authentication protocol based on hash function

Li Heng*, Gao Fei, Xue Yanming, Feng Shuo

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

The introduction of authentication protocols for RFID system provides the security to it, authentication protocol based on hash function is one of the most commonly used authentication protocol, which the hash function they used is a unilateral function, with a relatively high security, and it is easy to implement in the tag of RFID, so it has a wider application in RFID system. As the hash function, the characteristics of its own will have hash table conflicts, and thus would have resulted in security vulnerabilities, aim at the hash table conflict, this paper proposes a specific solution, and simulate the improved authentication protocol.

源语言英语
主期刊名Advances in Wireless Networks and Information Systems
177-182
页数6
DOI
出版状态已出版 - 2010
活动2009 International Conference on Wireless Networks and Information Systems, WNIS 2009 - Shanghai, 中国
期限: 28 12月 200929 12月 2009

出版系列

姓名Lecture Notes in Electrical Engineering
72 LNEE
ISSN(印刷版)1876-1100
ISSN(电子版)1876-1119

会议

会议2009 International Conference on Wireless Networks and Information Systems, WNIS 2009
国家/地区中国
Shanghai
时期28/12/0929/12/09

指纹

探究 'Research of RFID authentication protocol based on hash function' 的科研主题。它们共同构成独一无二的指纹。

引用此