Have a personal or library account? Click to login
Review on RFID Identity Authentication Protocols Based on Hash Function Cover

Review on RFID Identity Authentication Protocols Based on Hash Function

By: Yang Bing,  Liu Baolong and  Chen Hua  
Open Access
|Apr 2018

Abstract

Radio frequency identification (RFID) is one of the key technologies of Internet of Things, which have many security issues in an open environment. In order to solve the communication problem between RFID tags and readers, security protocols has been improved constantly as the first choice. But the form of attack is also changing constantly with the development of technology. In this paper we classify the security protocols and introduce some problems in the recent security protocols.

Language: English
Page range: 72 - 82
Published on: Apr 7, 2018
Published by: Xi’an Technological University
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2018 Yang Bing, Liu Baolong, Chen Hua, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.