Skip to main content

Research of RFID Authentication Protocol Based on Hash Function

  • Chapter
Advances in Wireless Networks and Information Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 72))

  • 1405 Accesses

Abstract

The introduction of authentication protocols for RFID system provides the security to it, authentication protocol based on hash function is one of the most commonly used authentication protocol, which the hash function they used is a unilateral function, with a relatively high security, and it is easy to implement in the tag of RFID, so it has a wider application in RFID system. As the hash function, the characteristics of its own will have hash table conflicts, and thus would have resulted in security vulnerabilities, aim at the hash table conflict, this paper proposes a specific solution, and simulate the improved authentication protocol.

Fund Item: 863 project” Research of communication test technology in RFID applications” (2006AA04A106).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhanqing, Y., Sujian, L.: The theory and application of RFID technology. Electronic Industry Press, Beijing (2004)

    Google Scholar 

  2. Zhenhua, D., Jintao, L., Bo, F.: Research on RFID Security Authentication Protocol based on Hash function. Computer Research and Development 46(4), 583–592 (2009)

    Google Scholar 

  3. Shuguang, Y., Hongyue, D., Shengli, L.: Research on RFID Authentication Protocol based on Hash function. Computer Engineering 34(12), 141–143 (2008)

    Google Scholar 

  4. Caixia, Z., Lianglun, C.: Design of RFID Security Protocol based on Hash function. Packaging Engineering 30(1), 115–117 (2009)

    Google Scholar 

  5. Yulan, Z.: Data Structures and Algorithms. Tsinghua University Press, Beijing (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Heng, L., Fei, G., Yanming, X., Shuo, F. (2010). Research of RFID Authentication Protocol Based on Hash Function. In: Luo, Q. (eds) Advances in Wireless Networks and Information Systems. Lecture Notes in Electrical Engineering, vol 72. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14350-2_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14350-2_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14349-6

  • Online ISBN: 978-3-642-14350-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics