By Topic

An Improved A-SRAC Authentication Protocol in RFID System

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
He lei ; Sch. of Comput. & Commun. Eng., Zhengzhou Univ. of Light Ind., Zhengzhou, China ; Gan Yong ; Li Na-Na ; Zhang Tao

As low-cost RFID tags with limited resource dominate in most of RFID applications, almost all security protocols used between the tag and reader are lightweight protocols which only need to implement some simple operations, such as hash function and XOR operation etc. In this paper, it is analyzed the security of different protocols based on the hash function. Afterwards, we find the A-SRAC protocol has preferable security property but its tag's cost is higher. According to this shortcoming, we propose an improved A-SRAC authentication protocol and analyze its performance and security. The result indicates that this protocol remains all merits of A-SRAC. It does not increase the computational amount obviously and has preferable security with decreased tag's cost.

Published in:

Wireless Communications, Networking and Mobile Computing, 2009. WiCom '09. 5th International Conference on

Date of Conference:

24-26 Sept. 2009