{"title":"A dynamic key authentication protocol for RFID system","authors":"Haibing Mu, Zhen-Ting Zheng","doi":"10.1504/IJMNDI.2017.10010150","DOIUrl":null,"url":null,"abstract":"RFID system faces a number of security problems with its pervasive using in all kinds of fields, such as the internet of things. According to the computing and storage limitation of the tag, we propose a mutual authentication protocol based on random numbers which can help determine the new keys with their fixed key seeds. The protocol mainly applies hash function and XOR operation which can be affordable for resource-constrained tags. As to the performance of the protocol, we discuss the security as well as its storage and computation overhead. Analysis shows that our protocol can resist common attacks with good effectiveness.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"75 1","pages":"210"},"PeriodicalIF":0.0000,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Mobile Network Design and Innovation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJMNDI.2017.10010150","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Business, Management and Accounting","Score":null,"Total":0}
引用次数: 0
Abstract
RFID system faces a number of security problems with its pervasive using in all kinds of fields, such as the internet of things. According to the computing and storage limitation of the tag, we propose a mutual authentication protocol based on random numbers which can help determine the new keys with their fixed key seeds. The protocol mainly applies hash function and XOR operation which can be affordable for resource-constrained tags. As to the performance of the protocol, we discuss the security as well as its storage and computation overhead. Analysis shows that our protocol can resist common attacks with good effectiveness.
期刊介绍:
The IJMNDI addresses the state-of-the-art in computerisation for the deployment and operation of current and future wireless networks. Following the trend in many other engineering disciplines, intelligent and automatic computer software has become the critical factor for obtaining high performance network solutions that meet the objectives of both the network subscriber and operator. Characteristically, high performance and innovative techniques are required to address computationally intensive radio engineering planning problems while providing optimised solutions and knowledge which will enhance the deployment and operation of expensive wireless resources.