论文部分内容阅读
The wireless transmission characteristics of RFID system is vulnerable to be attacked and theft within communication,to people adopt the physical methods and authentication encryption methods to enhance system security,authentication encryption methods is more useful due to its simple design.In this paper,we analysis of security vulnerabilities exist in the commonly used authentication protocol based on Hash function,on this basis bring forward a modified protocol.Through compare them in security,data storage condition and complexity of the algorithm,it can prove that the improved protocol has a very good improvement for RFID system’s overall performance,particularly in security.
The wireless transmission characteristics of RFID systems is vulnerable to be attacked and theft within communication, to people adopt the physical methods and authentication encryption methods to enhance system security, authentication encryption methods is more useful due to its simple design. In this paper, we analysis of security vulnerabilities exist in the commonly used authentication protocol based on Hash function, on this basis bring forward a modified protocol.Through compare them in security, data storage condition and complexity of the algorithm, it can prove that the improved protocol has a very good improvement for RFID system’s overall performance, particularly in security.