JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 154-159.doi: 10.6040/j.issn.1671-9352.2.2014.133

Previous Articles     Next Articles

An improved hash-based RFID security authentication algorithm

WANG Xu-yu, JING Feng-xuan, WANG Yu-qing   

  1. Key Laboratory of Information and Computing Science of Guizhou Province, Guizhou Normal University, Guiyang 550001, Guizhou, China
  • Received:2014-06-24 Revised:2014-08-28 Online:2014-09-20 Published:2014-09-30

Abstract: To settle the potential security problems during the authentication of radio frequency identification, an authentication protocol combined with Hash function and time stamp was proposed. The tag's identification and time stamp data were encrypted and transmitted through the Hash function, when they were used to authenticate. The ban logic proof and the simulative experiment of established Petri model showe the protocol has good forward security and can prevent replay, location tracking, illegal reading and other illegal attacks.

Key words: RFID, Hash function, authentication protocol

CLC Number: 

  • TP302
[1] 游战清.无线射频识别技术(RFID)理论与应用[M].北京:电子工业出版社,2004:13-17. YOU Zhanqing. Theory and application of radio frequency identification (RFID) [M]. Beijing: Publishing House of Electronics Industry, 2004:13-17.
[2] 康东, 石喜勤, 李勇鹏,等. 射频识别(RFID)核心技术与典型应用开发案例[M].第1版. 北京:人民邮电出版社, 2008:155-156. KANG Dong, SHI Xiqin, LI Yongpeng, et al. Radio frequency identification (RFID) core technology and typical application development case [M]. 1st ed. Beijing: People's Posts and Telecommunications Press, 2008:155-156.
[3] SARMA S E, WEIS S A, ENGELS D W. RFID systems and security and privacy implications[C]//Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHE 2002). Berlin: Springer, 2002:454-469
[4] WEIS S A, SARMA S E, RIVEST R L, et al.Security and privacy aspects of low-cost radio frequency identification systems[C]//Proceeding of the1st International Conference on Security in Pervasive Computing. Berlin: Springer, 2003:201-212.
[5] HENRICI D, MULLER P.Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers[C]//Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW' 04). Washington: IEEE Computer Society, 2004:149-153.
[6] Stuart Haber, W Scott Stornetta. How to time-stamp a digital document [J]. Journal of Cryptology, 1991, 3(2):99-111.
[7] 谢晓尧.电子商务网络协议的形式化分析理论与应用[M].北京:科学出版社,2008:15-17. XIE Xiaoyao.The electronic commerce network protocols formal analysis: theory and applications[M]. Beijing: Science Press, 2008: 15-17.
[8] 李红静,刘丹.基于矩阵理论的RFID认证协议设计及BAN逻辑分析[J].计算机应用,2013, 33(7):1854-1857. LI Hongjing, LIU Dan. Matrix-based authentication protocol for RFID and BAN logic analysis[J]. Journal of Computer Applications, 2013, 33(7):1854-1857.
[9] TSAI J J P, YANG Jennhwa, CHANG Yao-Hsiung. Timing constraint Petri nets and their application to schedulability analysis of real-time system specifications [J]. IEEE Transactions on Software Engineering, 1995, 21(1):32-49.
[10] 张兵,马新新,秦志光.基于hash运算的RFID认证协议分析和改进[J].计算机应用研究,2011, 28(11):4311-4314. ZHANG Bing, MA Xinxin, QIN Zhiguang. Analysis and improvement of hash-based RFID authentication protocol[J]. Application Research of Computers, 2011, 28(11): 4311-4314.
[1] WAN Zhi-ping. An authentication protocol based on hybrid Das protocol for wireless sensor networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(05): 12-17.
[2] RAO Xu-li1, ZHANG Mei-ping2, XU Li2. The RFID card reader system design based on Zigbee technology [J]. J4, 2013, 48(7): 62-67.
[3] RAO Xu-li1, ZHANG Mei-ping2, MA Xian-hu2. Design of laboratory equipment monitoring management system based on the internet of things [J]. J4, 2012, 47(11): 74-77.
[4] LI Lin . Cryptanalysis of MD4 [J]. J4, 2007, 42(4): 1-05 .
[5] LI Lin . The collision attack on the last three rounds of RIPEMD-128 [J]. J4, 2007, 42(3): 1-07 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!