閱讀全文 | |
篇名 |
An Improved RFID Authentication Protocol with Privacy Protection Based on Chaotic Maps
|
---|---|
並列篇名 | An Improved RFID Authentication Protocol with Privacy Protection Based on Chaotic Maps |
作者 | Hongfeng Zhu、Yan Zhang |
英文摘要 | Considering the convenience of reusability and identifiability of Radio frequency identification (RFID) technology, increasingly industries tend to use these properties, such as in the area of transportation, logistics, medical treatment, military, and so on. Many researchers have proposed RFID authentication protocols that conform to the EPCglobal Class 1 Generation 2 (EPC C1-G2) standard. Recently, Akgun et al. have proposed an RFID authentication protocol which utilized the Chebyshev chaotic map hard problem to realize flexibility RFID application. However, we point out three security flaws in their protocol. Firstly, we find that their protocol lack of RFID tag verification. Secondly, the protocol is vulnerable to tag impersonation attack and desynchronization attack. Therefore, in this paper, we propose an improved RFID authentication protocol based on chaotic maps hard problem. Our protocol has the feature of privacy protection and robust to many malicious attacks. Moreover, the protocol also enhances the security of the RFID system. |
起訖頁 | 1777-1788 |
關鍵詞 | RFID、De-synchronization attack、Chaotic maps、Authentication |
刊名 | 網際網路技術學刊 |
期數 | 201811 (19:6期) |
出版單位 | 台灣學術網路管理委員會 |
DOI |
|
QR Code | |
該期刊 上一篇
| Addressing Data Governance in Cloud Storage: Survey, Techniques and Trends |
該期刊 下一篇
| An Improved Integrated Prediction Method of Cyber Security Situation Based on Spatial-time Analysis |