Visible to the public Review on RFID Identity Authentication Protocols Based on Hash Function

TitleReview on RFID Identity Authentication Protocols Based on Hash Function
Publication TypeConference Paper
Year of Publication2017
AuthorsBing, Y., Baolong, L., Hua, C.
Conference Name2017 International Conference on Computer Network, Electronic and Automation (ICCNEA)
Date Published Sept. 2017
PublisherIEEE
ISBN Number978-1-5386-3981-8
KeywordsAttack, authentication, Databases, hash, Human Behavior, human factors, privacy, protocol, Protocols, pubcrawl, radiofrequency identification, Resiliency, RFID, RFIDs, Synchronization
Abstract

Radio frequency identification (RFID) is one of the key technologies of Internet of Things, which have many security issues in an open environment. In order to solve the communication problem between RFID tags and readers, security protocols has been improved constantly as the first choice. But the form of attack is also changing constantly with the development of technology. In this paper we classify the security protocols and introduce some problems in the recent security protocols.

URLhttps://ieeexplore.ieee.org/document/8128524/
DOI10.1109/ICCNEA.2017.20
Citation Keybing_review_2017