Review on RFID Identity Authentication Protocols Based on Hash Function
Title | Review on RFID Identity Authentication Protocols Based on Hash Function |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Bing, Y., Baolong, L., Hua, C. |
Conference Name | 2017 International Conference on Computer Network, Electronic and Automation (ICCNEA) |
Date Published | Sept. 2017 |
Publisher | IEEE |
ISBN Number | 978-1-5386-3981-8 |
Keywords | Attack, authentication, Databases, hash, Human Behavior, human factors, privacy, protocol, Protocols, pubcrawl, radiofrequency identification, Resiliency, RFID, RFIDs, Synchronization |
Abstract | Radio frequency identification (RFID) is one of the key technologies of Internet of Things, which have many security issues in an open environment. In order to solve the communication problem between RFID tags and readers, security protocols has been improved constantly as the first choice. But the form of attack is also changing constantly with the development of technology. In this paper we classify the security protocols and introduce some problems in the recent security protocols. |
URL | https://ieeexplore.ieee.org/document/8128524/ |
DOI | 10.1109/ICCNEA.2017.20 |
Citation Key | bing_review_2017 |