With the increasingly expanding application of RFID technology, the security and privacy issues of RFID system has also been a widespread concern. The existing RFID security protocol can’t simultaneously meet the requirements of low-cost, low computing, high efficiency and high security. In this paper, through the analysis of common principles and shortcomings of RFID security protocols based on Hash Function, we improve the security protocols, so as to achieve the objectives of two-way authentication. This paper theoretically proves the protocol security through BAN logic. And the new protocols can effectively solve the security and privacy problems such as replay attack, fake attack, location privacy, anonymous tags and so on. The paper proposes a kind of authentication and communication security mechanism that makes full use of the functions of the conditional Access Module (CAM) which exist in the original remote education system and when authenticating the nodes of the system, we use the proposed security scheme. Analysis showed that the mechanism is safe, reliable, strong compatibility, economic and applicable.
- Hash Function
- Security Protocol
- BAN Logic
- Remote education system
Yang, L., Wu, Q., Bai, Y., Zheng, H., & Lin, S. (2016). An Improved Hash-Based RFID Two-Way Security Authentication Protocol and Application in Remote education. Journal of Intelligent and Fuzzy Systems, 31(5), 2713-2720. https://doi.org/10.3233/JIFS-169111