Research on RFID Security Authentication Protocol Based on HASH Function

Zhen-huan CHEN, Xue-feng PAN
2018 DEStech Transactions on Engineering and Technology Research  
Aiming at the problem that RFID technology is vulnerable to tracking attack and replay attack in the process of information transmission, in order to improve the security of information transmission, based on the existing RFID authentication protocol, a RFID security scheme based on hash function is proposed. The protocol, while taking into account the tag overhead, increases the use of tags for information transmission and reader authentication, ensuring the security and efficiency of the
more » ... ntication process. Good agreement with comprehensive performance is proved by BAN logic, the protocol not only has the advantages of small amount of operation and the required storage space and low cost, but also has anti eavesdropping, forward security, anti tracking, advantages of indiscernibility and anti replay attack to a certain extent, the potential safety problems of RFID technology encountered in the process of information transmission is solved.
doi:10.12783/dtetr/ecar2018/26353 fatcat:ibr6ev7h45aavpwfmigeibtrhy