Time filter

Source Type

Peng S.Q.,The PLA Academy of National Defense Information | Wang L.,The PLA Academy of National Defense Information
Applied Mechanics and Materials | Year: 2013

To address the security problems caused by the fake readers, and the weakness of low authentication protocol efficiency, a new RFID security authentication protocol based on Hash function is proposed. The security ability of the protocol is compared with other protocols' and is proved by doing the formal analysis. The theoretical analysis and formal proof is presented to prove the security ability of the protocol. Consequently, the result showed that the new protocol could protect the data privacy, achieve the data synchronization, prevent the tag from location tracking, avoid information reproduction, prevent clone and counterfeit and possess forward security ability which was useful for low-cost tags. © (2013) Trans Tech Publications, Switzerland.

Discover hidden collaborations