Advanced Search
Volume 31 Issue 3
Dec.  2010
Turn off MathJax
Article Contents
Ding Zhi-guo, Guo Li, Wang Yu-jie. An Authentication Protocol Based on Key Array for RFID[J]. Journal of Electronics & Information Technology, 2009, 31(3): 722-726. doi: 10.3724/SP.J.1146.2007.01753
Citation: Ding Zhi-guo, Guo Li, Wang Yu-jie. An Authentication Protocol Based on Key Array for RFID[J]. Journal of Electronics & Information Technology, 2009, 31(3): 722-726. doi: 10.3724/SP.J.1146.2007.01753

An Authentication Protocol Based on Key Array for RFID

doi: 10.3724/SP.J.1146.2007.01753
  • Received Date: 2007-11-07
  • Rev Recd Date: 2008-04-14
  • Publish Date: 2009-03-19
  • As RFID becomes more and more popular, it is imperative to design authentication protocols to resist all possible attacks and threats. In order to overcome counterfeits of readers, a new authentication protocol is proposed based on key array. The new protocol can deal with the synchronization of key update by adding flags of key update. It can resist several possible attacks, including reply, tracking, blocking, proofing and inner attacks. Compared with other authentication protocols, the new protocol can improve the security of RFID systems effectively and does not increase the complexity of protocol.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3243) PDF downloads(1050) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return