An Improved Hash-Based RFID Two-Way Security Authentication Protocol and Application in Remote education

Lvqing Yang, Qingxiang Wu, Youjing Bai, Huiru Zheng, Shufu Lin

Research output: Contribution to journalArticlepeer-review

8 Citations (Scopus)
74 Downloads (Pure)

Abstract

With the increasingly expanding application of RFID technology, the security and privacy issues of RFID system has also been a widespread concern. The existing RFID security protocol can’t simultaneously meet the requirements of low-cost, low computing, high efficiency and high security. In this paper, through the analysis of common principles and shortcomings of RFID security protocols based on Hash Function, we improve the security protocols, so as to achieve the objectives of two-way authentication. This paper theoretically proves the protocol security through BAN logic. And the new protocols can effectively solve the security and privacy problems such as replay attack, fake attack, location privacy, anonymous tags and so on. The paper proposes a kind of authentication and communication security mechanism that makes full use of the functions of the conditional Access Module (CAM) which exist in the original remote education system and when authenticating the nodes of the system, we use the proposed security scheme. Analysis showed that the mechanism is safe, reliable, strong compatibility, economic and applicable.
Original languageEnglish
Pages (from-to)2713-2720
Number of pages8
JournalJournal of Intelligent and Fuzzy Systems
Volume31
Issue number5
DOIs
Publication statusPublished (in print/issue) - 13 Oct 2016

Keywords

  • RFID
  • Hash Function
  • Security Protocol
  • BAN Logic
  • Remote education system

Fingerprint

Dive into the research topics of 'An Improved Hash-Based RFID Two-Way Security Authentication Protocol and Application in Remote education'. Together they form a unique fingerprint.

Cite this