An Improved Hash-Based RFID Two-Way Security Authentication Protocol and Application in Remote education

Lvqing Yang, Qingxiang Wu, Youjing Bai, Huiru Zheng, Shufu Lin

    Research output: Contribution to journalArticlepeer-review

    8 Citations (Scopus)
    71 Downloads (Pure)

    Abstract

    With the increasingly expanding application of RFID technology, the security and privacy issues of RFID system has also been a widespread concern. The existing RFID security protocol can’t simultaneously meet the requirements of low-cost, low computing, high efficiency and high security. In this paper, through the analysis of common principles and shortcomings of RFID security protocols based on Hash Function, we improve the security protocols, so as to achieve the objectives of two-way authentication. This paper theoretically proves the protocol security through BAN logic. And the new protocols can effectively solve the security and privacy problems such as replay attack, fake attack, location privacy, anonymous tags and so on. The paper proposes a kind of authentication and communication security mechanism that makes full use of the functions of the conditional Access Module (CAM) which exist in the original remote education system and when authenticating the nodes of the system, we use the proposed security scheme. Analysis showed that the mechanism is safe, reliable, strong compatibility, economic and applicable.
    Original languageEnglish
    Pages (from-to)2713-2720
    Number of pages8
    JournalJournal of Intelligent and Fuzzy Systems
    Volume31
    Issue number5
    DOIs
    Publication statusPublished (in print/issue) - 13 Oct 2016

    Keywords

    • RFID
    • Hash Function
    • Security Protocol
    • BAN Logic
    • Remote education system

    Fingerprint

    Dive into the research topics of 'An Improved Hash-Based RFID Two-Way Security Authentication Protocol and Application in Remote education'. Together they form a unique fingerprint.

    Cite this