Journal of Jilin University Science Edition

Previous Articles     Next Articles

Hash Based to RFID Security Authentication ProtocolWhich Against the Loss of Aynchronization

ZHENG Ying1,2,3, OUYANG Dantong2,3, HE Lili2,3 , BAI Hongtao1,2   

  1. 1. Center for Computer Fundamental Education, Jilin University, Changchun 130012, China; 2. Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University,Changchun 130012, China; 3. College of Computer Science and Technology, Jilin University, Changchun 130012, China
  • Received:2014-08-21 Online:2015-05-26 Published:2015-05-21
  • Contact: OUYANG Dantong E-mail:ouyangdantong@163.com

Abstract:

For synchronous safety problems existed in RFID technology, the paper proposes a new security authentication protocol based on a oneway Hash function, a more comprehensive solution to the presence of RFID systems in various security problems. The proposed protocol was formally proven and comparatively analyzed based on GNY logic. The results show that the protocol can effectively solve the eavesdropping, replay attacking and  synchronization losing problems and other safety issues, and is prior to  a series of agreements in the current mainstream in energy, security and performance.

Key words: RFID, Hash function, protocol, GNY logic

CLC Number: 

  • TP309