Nure Alam Md. Risalat, M. T. Hasan, Md. Shahadat Hossain, M. Rahman
{"title":"先进的RFID实时互认证协议,通过加解密过程动态更新秘密值","authors":"Nure Alam Md. Risalat, M. T. Hasan, Md. Shahadat Hossain, M. Rahman","doi":"10.1109/ECACE.2017.7913010","DOIUrl":null,"url":null,"abstract":"Radio Frequency Identification (RFID) Technology is growing popular in wireless communications. It can be used easily for security purposes using authentication protocol. In the literature, researchers proposed different types of RFID based authentication protocols to ensure security and privacy. RFID technology is used in IoT (Internet of things) for real time authentication like access control in offices, homeland security, and transportation and also in defense and sensitive medical organizations. In this paper we proposed a hash based mutual authentication protocol that can dynamically update secret key value between tag and the reader. This protocol is secure and immune to different kinds of attacks.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Advanced real time RFID mutual authentication protocol using dynamically updated secret value through encryption and decryption process\",\"authors\":\"Nure Alam Md. Risalat, M. T. Hasan, Md. Shahadat Hossain, M. Rahman\",\"doi\":\"10.1109/ECACE.2017.7913010\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Radio Frequency Identification (RFID) Technology is growing popular in wireless communications. It can be used easily for security purposes using authentication protocol. In the literature, researchers proposed different types of RFID based authentication protocols to ensure security and privacy. RFID technology is used in IoT (Internet of things) for real time authentication like access control in offices, homeland security, and transportation and also in defense and sensitive medical organizations. In this paper we proposed a hash based mutual authentication protocol that can dynamically update secret key value between tag and the reader. This protocol is secure and immune to different kinds of attacks.\",\"PeriodicalId\":333370,\"journal\":{\"name\":\"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECACE.2017.7913010\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECACE.2017.7913010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Advanced real time RFID mutual authentication protocol using dynamically updated secret value through encryption and decryption process
Radio Frequency Identification (RFID) Technology is growing popular in wireless communications. It can be used easily for security purposes using authentication protocol. In the literature, researchers proposed different types of RFID based authentication protocols to ensure security and privacy. RFID technology is used in IoT (Internet of things) for real time authentication like access control in offices, homeland security, and transportation and also in defense and sensitive medical organizations. In this paper we proposed a hash based mutual authentication protocol that can dynamically update secret key value between tag and the reader. This protocol is secure and immune to different kinds of attacks.