2010 | OriginalPaper | Buchkapitel
Research of RFID Authentication Protocol Based on Hash Function
verfasst von : Li Heng, Gao Fei, Xue Yanming, Feng Shuo
Erschienen in: Advances in Wireless Networks and Information Systems
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
The introduction of authentication protocols for RFID system provides the security to it, authentication protocol based on hash function is one of the most commonly used authentication protocol, which the hash function they used is a unilateral function, with a relatively high security, and it is easy to implement in the tag of RFID, so it has a wider application in RFID system. As the hash function, the characteristics of its own will have hash table conflicts, and thus would have resulted in security vulnerabilities, aim at the hash table conflict, this paper proposes a specific solution, and simulate the improved authentication protocol.