Abstract

The security and privacy problem of low-cost RFID system is one of the most difficult conundrums in the RFID research field. A protocol based on access control was proposed in this paper, which used the reader access, partial ID, XOR operation, etc. By using of the reader authority distribution method, the unauthorized tag`s information was prevented give-away and it can avoid the lawful reader attack, location privacy attack, etc. Function of the reader was fully used. At the same time, the back-end database`s load and the time of the tag`s answer were reduced. Compared with several traditional security authentication protocols, this protocol is more security, lower energy consumption and more suitable for low-cost RFID system.

Highlights

  • Following the development of the Internet of things and the mature of related technology, the RFID technology is more and more attention by people

  • On the base of analysis of the existing agreement, this paper proposes a kind of RFID secure authentication protocol based on access control

  • To compensate for the shortcomings and deficiencies of RFID security protocols, this paper proposed a protocol which based on access control

Read more

Summary

Introduction

Following the development of the Internet of things and the mature of related technology, the RFID technology is more and more attention by people. Because of the particularity of the RFID system, people begin to attach importance to its security and privacy. On the base of analysis of the existing agreement, this paper proposes a kind of RFID secure authentication protocol based on access control. This protocol controls the reader through the back-end database, effectively prevents illegal reading of unauthorized tags information and enhances the RFID system’s security. Some of the ID[1] and the bit operation, reduce the times of security of authentication protocol and make full use of the reader resources, which is more suitable for the low-cost RFID system

Authentication Protocol for RFID System
Proposed Authentication Protocol
The readerss ID
Security Analysis
Efficiency Analysis
The proposed
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call