RFID Authentication Protocol in Conformity with the Gen-2 Standard

李静 LJ


Considering that Radio Frequency Identification (RFID) Gen-2 tags have very limited computational capabilities, a Gen-2-based for RFID authentication protocol is proposed. The 32-bit ID number label is divided into the low and high 16-bit, using the CRC-16 function as a verification function to encapsulate texts. It has been proved that the protocol could avoid the five security deficiencies, improve the speed of querying database and reduce the design cost of RFID tags. It has used BAN logic to do the formal analysis about the proposed protocol, assumptions and sending messages, and theoretically proved that the protocol is safe.


全文: PDF      下载: 1122      浏览: 960

counter for myspace
云南民族大学学报(自然科学版) 1991—2016 Copyright
地址:云南省昆明市一二.一大街134号 邮编:650031 全国邮发代号:64-47
电话:0871-65132114 传真:0871-65137493