By Topic

Low-cost authentication protocol of RFID system using One block Hash function

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Shi-mei Jin ; Dept. of Comput. Sci. & Technol, Yanbian Univ. Yanji, Yanji, China ; Mo You ; Yong-zhen Li

RFID has been widely used in personal life. To the security problems of RFID, there are many different kinds of strategies and protocol, This article point out the disadvantages of these protocols, then come up with One block Hash function, and make a comparison with the most popular MD5 algorithm, improve the RFID authentication protocol by One block Hash function, and show the comparison with the now most popular algorithm on the security, computation and memory capability. This RFID authentication protocol based on one block Hash function can guarantee the safety, meanwhile, reduce the amount of computation of the tag, and achieve the function of low-power in authentic process of tags. It has resolved the two shackles in the development of the RFID system.

Published in:

Computer Sciences and Convergence Information Technology (ICCIT), 2011 6th International Conference on

Date of Conference:

Nov. 29 2011-Dec. 1 2011