Have a personal or library account? Click to login
Review on RFID Identity Authentication Protocols Based on Hash Function Cover

Review on RFID Identity Authentication Protocols Based on Hash Function

By: Yang Bing,  Liu Baolong and  Chen Hua  
Open Access
|Apr 2018

References

  1. Ohkubo M, Suzuki K, Kinoshta S, “Hash-chain based for-ward-secure privacy protection scheme for low-cost RFID Proceedings of the 2004 Symposium on Cryptogra-phy and Information Security. Berlin: Springer-Verlag,2004,pp.719-724.
  2. Sarma S, Weis S, Engels D, “RFID systems and security and privacy implications,” Proc of the 4th Int Work-shop on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2002,pp. 454-469.10.1007/3-540-36400-5_33
  3. Weis S A, Sarma S E, Rivest R L, “et al.Security and privacy aspects of low-cost radio frequency identification systems, Proc of the 1st Security in Pervasive Com-putting.Berlin: Springer, 2003,pp.201-212.10.1007/978-3-540-39881-3_18
  4. Taoyuan, Zhou Xideng, “Mobile mutual authentication protocol based on hash function,” Journal of Computer Applications, 2016, 36 (3),pp.657 – 660.
  5. Hou Jinhuan, Ding Fuqiang, “New things RFID security protocol analysis and design of,” electronic technology and software engineering, 2015.
  6. Zhao Ting, Wang Jian, “Dynamic RFID authentication protocol,” 2010 Hash function of the National Communications Security Conference on.
  7. Guo Wei, “Improvement of HASH Chain Protocol in RFID,” second national information security protection technology conference proceedings, 2013, 6, 21.
  8. C. Tan, B. Sheng, and Q. Li, “Secure and serverless rfid authentication and search protocols,” vol. 7, no. 4, april 2008, pp. 1400 – 1407.10.1109/TWC.2008.061012
  9. Minghui Wang, Yongzheng Tang, Fang Shi, Junhua Pan, “An effective RFID authentication protocol, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), pp.141 – 144.10.1109/CECNet.2012.6201603
  10. Tan C., Sheng B., and Li Q., “Severless search and authentication protocols for RFID, In Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications(PerCom ‘07), New York, USA. pp. 3-12 .
  11. Ahamed, S. I., Rahman, F., and Hoque, M., Kawsar, E, and Nakajima,T, “YA-SRAP: Yet another serverless RFID authentication protocol, In Proceedings of the 4th IET International Conference on Intelligent Environment (IE08). Seattle, USA. pp. 1-8,2008.10.1049/cp:20081141
  12. Feng Zebo, Wu Xiaoping, Liu Haohan, “RFID security authentication protocol a new free end database, Journal of Naval University of engineering, 2015,02,pp.32-36.
  13. Selwyn Piramuthu, “RFID mutual authentication protocols,” Decision Support Systems, Vol.50, Issue 2, January 2011, pp.387-393.10.1016/j.dss.2010.09.005
  14. Su Mi Lee, Young Ju Hwang, Dong Hoon Lee, Jong In Lim, “Efficient Authentication for Low-Cost RFID Systems, Lecture Notes in Computer Science. Berlin, vol.3480, pp. 619-627,2005.
  15. Yong Ki Lee, Ingrid Verbauwhede, “Secure and Low-cost RFID Authentication Protocols,” Proceedings of the 2nd IEEE Workshop on Adaptive Wireless Networks, 2005.
  16. Kaleb Lee, “A Two-Step Mutual Authentication Protocol Based on Randomized Hash- Lock for Small RFID Networks, 2010 Fourth International Conference on Network and System Security, pp. 527 – 533.10.1109/NSS.2010.30
  17. Eun Young Choi,Su Mi Lee,Dong Hong Lee, “Efficient RFID Authentication Protocol for Ubiquitous Computing Environment, Embedded and Ubiquitous Computing, vo1.3832, pp.945-954, 2005.
  18. He Lei, Lu Xin-mei, Jin Song-he, Cai Zeng-yu, “A One-way Hash based Low-cost Authentication Protocol with Forward Security in RFID System, 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR 2010)[2],pp.269 – 272.10.1109/CAR.2010.5456551
  19. J. H. Ha, S. J. Moon, J. Y. Zhou, and J. C. Ha, “A new formal proof model for RFID location privacy, in: S. Jajodia and J. Lopez, editors, Proceedings of 13th European Symposium on Research in Computer Security–ESORICS’08, LNCS 5283, Springer–Verlag, pp. 267 – 281,2008.10.1007/978-3-540-88313-5_18
  20. Da-Zhi Sun, Ji-Dong Zhong, “A hash-based RFID security protocol for strong privacy protection, IEEE Transactions on Consumer Electronics (2012) Vol.58, Issue: 4, pp.1246 - 1252.
  21. Liang Huan qi, “Research of Mutual Authentication Protocol for RFID Based on Hash Function and Public Key, South China University of Technology, 2012.
  22. Jianliang Meng, Ze Wang, “A RFID Security Protocol Based on Hash Chain and Three-Way Handshake, 2013 International Conference on Computational and Information Sciences,pp.1463 – 1466.
  23. Yanfei Liu, Sha Feng, “Scalable Lightweight Authentication Protocol with Privacy Preservation,” 2014 Tenth International Conference on Computational Intelligence and Security, pp.474 – 478.
  24. T. Li, W. Luo, Z. Mo, and S. Chen, “Privacy-preserving RFID authentication based on cryptographical encoding,” IEEE INFOCOM,2012, pp. 2174-2182.
  25. G. Avoine, L. Buttyan, T. Holczer, and I. Vajda, “Group-Based Private Authentication,” IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks, 2007, pp. 1-6.10.1109/WOWMOM.2007.4351808
  26. Prosanta Gope and Tzonelih Hwang, “A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system, Computers & Security, Vol.55, November 2015, pp.271-280.10.1016/j.cose.2015.05.004
  27. Prajnamaya Dass, Hari Om, “A secure authentication scheme for RFID Systems,” Procedia Computer Science, Vol.78, 2016, pp. 100-106.10.1016/j.procs.2016.02.017
  28. Jung-Sik Cho, Young-Sik Jeong and Sang Oh Park, “Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol, Computers & Mathematics with Applications, Vol.69, Issue 1, January 2015, pp. 58-65.10.1016/j.camwa.2012.02.025
  29. Dang Nguyen Duc and Kwangjo Kim, “Defending. RFID authentication protocols against DoS attacks, Computer Communications, Vol.34, Issue 3, 15 March 2011, pp. 384-390.10.1016/j.comcom.2010.06.014
Language: English
Page range: 72 - 82
Published on: Apr 7, 2018
Published by: Xi’an Technological University
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2018 Yang Bing, Liu Baolong, Chen Hua, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.