An Effective RFID Security Protocol Based on Secret Sharing

The Hash function is used to design a radio frequency identification (RFID) security protocol, which is based on secret sharing. The improved hash-based identifier variation (HIDV) scheme is adopted to solve the following questions: location privacy, resist replay and forgery attacks. Since the sync...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Zhijian Gao, Yi Jiang, Zhenxiong Lin
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The Hash function is used to design a radio frequency identification (RFID) security protocol, which is based on secret sharing. The improved hash-based identifier variation (HIDV) scheme is adopted to solve the following questions: location privacy, resist replay and forgery attacks. Since the synchronization loss between tag and server is resolved, we can control the denial of service that exists in many RFID security protocols. Compared with other related protocols in security, efficiency and cost, the proposed protocol is proved to be safe, effective and low-cost.
DOI:10.1109/IMCCC.2012.188