Xiaobing Liang, Yingjie Lv, B. Zhao, Y. Liu, Zhiqiang Sun, Wei Cen
{"title":"RFID互鉴安全协议设计与分析","authors":"Xiaobing Liang, Yingjie Lv, B. Zhao, Y. Liu, Zhiqiang Sun, Wei Cen","doi":"10.1109/3PGCIC.2014.146","DOIUrl":null,"url":null,"abstract":"For RFID mutual authentication security protocols which need back-end server have poor mobile performance, it cannot be applied to environments which have poor wireless network. The RFID mutual authentication security protocol based on key dispersion algorithm is designed in this paper, which proposes a new method for managing and distributing keys for a large number of tags. This protocol which does not need the back-end database can be achieved security mutual authentication between the reader and the tag, the reader only need to store a pair of root keys, the key dispersal algorithms can disperse the corresponding mutual authentication keys with the tag identification number. Compared with the other of the same type RFID mutual authentication security protocols, results indicate that the proposed protocol in this paper has higher efficiency and security.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A RFID Mutual Authentication Security Protocol Design and Analysis\",\"authors\":\"Xiaobing Liang, Yingjie Lv, B. Zhao, Y. Liu, Zhiqiang Sun, Wei Cen\",\"doi\":\"10.1109/3PGCIC.2014.146\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For RFID mutual authentication security protocols which need back-end server have poor mobile performance, it cannot be applied to environments which have poor wireless network. The RFID mutual authentication security protocol based on key dispersion algorithm is designed in this paper, which proposes a new method for managing and distributing keys for a large number of tags. This protocol which does not need the back-end database can be achieved security mutual authentication between the reader and the tag, the reader only need to store a pair of root keys, the key dispersal algorithms can disperse the corresponding mutual authentication keys with the tag identification number. Compared with the other of the same type RFID mutual authentication security protocols, results indicate that the proposed protocol in this paper has higher efficiency and security.\",\"PeriodicalId\":395610,\"journal\":{\"name\":\"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/3PGCIC.2014.146\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/3PGCIC.2014.146","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A RFID Mutual Authentication Security Protocol Design and Analysis
For RFID mutual authentication security protocols which need back-end server have poor mobile performance, it cannot be applied to environments which have poor wireless network. The RFID mutual authentication security protocol based on key dispersion algorithm is designed in this paper, which proposes a new method for managing and distributing keys for a large number of tags. This protocol which does not need the back-end database can be achieved security mutual authentication between the reader and the tag, the reader only need to store a pair of root keys, the key dispersal algorithms can disperse the corresponding mutual authentication keys with the tag identification number. Compared with the other of the same type RFID mutual authentication security protocols, results indicate that the proposed protocol in this paper has higher efficiency and security.