An Effective RFID Security Protocol Based on Secret Sharing
The Hash function is used to design a radio frequency identification (RFID) security protocol, which is based on secret sharing. The improved hash-based identifier variation (HIDV) scheme is adopted to solve the following questions: location privacy, resist replay and forgery attacks. Since the sync...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The Hash function is used to design a radio frequency identification (RFID) security protocol, which is based on secret sharing. The improved hash-based identifier variation (HIDV) scheme is adopted to solve the following questions: location privacy, resist replay and forgery attacks. Since the synchronization loss between tag and server is resolved, we can control the denial of service that exists in many RFID security protocols. Compared with other related protocols in security, efficiency and cost, the proposed protocol is proved to be safe, effective and low-cost. |
---|---|
DOI: | 10.1109/IMCCC.2012.188 |