Design of RFID Authentication Protocol Based on Hash Function

张文丽
DOI: https://doi.org/10.3969/j.issn.1005-1228.2012.02.016
2012-01-01
Abstract:With the growing application of RFID systems, RFID security issues are also more and more attention. Hash-based RFID security protocol has been widely used with its low-cost, but its safety performance is not perfect. The p2per proposed three kinds of hash-based security authentication protocol based on the analysis of existing security protocols. On the basis of the security and performance evaluation of these protocols, IHSAP3 is the best in performance, it can prevent many security including information leakage, location tracingoreplay attack,etc.
What problem does this paper attempt to address?