Efficient Implementation of Hash Sequence Authentication Based on RFID

被引:0
|
作者
Pratama, Andreyanto [1 ]
Hidyatullah, Taufik [1 ]
Putranto, Dedy Septono Catur [1 ]
机构
[1] Natl Crypto Inst, Sekolah Tinggi Sandi Negara, Bogor, West Java, Indonesia
关键词
lamport; authentication; hash function; arduino; rfid; SECURITY; PROTOCOL; SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security for accessing an area need to be noticed. Access restriction can be applied using authentication such as password. Thereby, the strong password is required, but it is hard to remember. Strong password can be generated by using hash function and stored on smart card can be solution. Smart card can be used as access card. Nevertheless, vulnerabilities of the card need to be noticed. Lamport's scheme as hash sequence authentication can be implemented to create dynamic access card which replicate resistant. Hash sequence authentication used to authenticate the prover. The prover should give hash value as input that has result equal with the verifier has. This scheme will be implemented using Arduino Mega ADK. The result of this research is a login hardware prototype.
引用
收藏
页码:468 / 473
页数:6
相关论文
共 50 条
  • [1] RFID Tags Authentication by Unique Hash Sequence Detection
    Alma'aitah, Abdallah Y.
    Hassanein, Hossam S.
    Ibnkahla, Mohamed
    PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 775 - 781
  • [2] Efficient RFID authentication protocols based on pseudorandom sequence generators
    Jooyoung Lee
    Yongjin Yeom
    Designs, Codes and Cryptography, 2009, 51 : 195 - 210
  • [3] Efficient RFID authentication protocols based on pseudorandom sequence generators
    Lee, Jooyoung
    Yeom, Yongjin
    DESIGNS CODES AND CRYPTOGRAPHY, 2009, 51 (02) : 195 - 210
  • [4] Hash-based RFID Mutual Authentication Protocol
    Liu, Yang
    Peng, Yu
    Wang, Bailing
    Qu, Yun
    Bai, Xuefengi
    Yuan, Xinling
    Yin, Zelong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 183 - 194
  • [5] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [6] A New RFID Secure Authentication Protocol Based on Hash
    Li Hai-lin
    Xu Peng-fei
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 429 - 432
  • [7] Efficient Implementation of RFID Mutual Authentication Protocol
    Huang, Yu-Jung
    Lin, Wei-Cheng
    Li, Hung-Lin
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (12) : 4784 - 4791
  • [8] Implementation of RFID middleware based on Hash chain
    Yuan Jin Sha
    Hu Yue
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 12 - 15
  • [9] An Efficient Hash-based RFID Grouping Authentication Protocol Providing Missing Tags Detection
    Tan, Haowen
    Choi, Dongmin
    Kim, Pankoo
    Pan, Sungbum
    Chung, Ilyong
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (02): : 481 - 488
  • [10] Review on RFID Identity Authentication Protocols Based on Hash Function
    Yang Bing
    Liu Baolong
    Chen Hua
    2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 20 - 27