Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
A RFID Authentication Protocol
GUAN Yu
Guangxi Normal University
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  RFID system generally includes three parts: tag, reader and database, where there is the hidden danger between tags and reader through wireless communication. In order to ensure the security of communication information, a bidirectional authentication protocol which is suitable for label and reader is proposed, which can solve the problem of security hidden danger. Bidirectional authentication protocol adopts the mechanism of transmission after message encryption, which makes the attacker eavesdropping information is not clear, thus ensuring the security of information.
Key wordsRadio Frequency Identification (RFID)      tag      radio frequency system     
ZTFLH:  TP393.08  

Cite this article:

GUAN Yu. A RFID Authentication Protocol. Computer & Telecommunication, 2018, 1(4): 31-33.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2018/V1/I4/31

[1] LIU Wan-wan. Research onAgglutinating Language Part of Speech Tagging Based on Structured SVM[J]. 电脑与电信, 2021, 1(1): 23-26.
[2] LI Jie. An Exploration of the Research Reform of Computer Network Curriculum Based on the Three-stage Teaching Model of "Subject Inquiry"[J]. 电脑与电信, 2019, 1(5): 18-20.
[3] HUANG Xiao-hua. Analysis on the Head of the Web[J]. 电脑与电信, 2019, 1(5): 75-77.
[4] ZHANG Shuang JI Miao-miao LI Yi-qian LI Zhu. Design of Stabilized Voltage Switching Power Supply Based on TL494[J]. 电脑与电信, 2019, 1(1-2): 9-12.
[5] ZHENG Ai-yuan. Research on Evaluation Function Based on Indexin Fuzzy Network[J]. 电脑与电信, 2018, 1(9): 32-35.
[6] Liu Daowei. A Single Tag Key Generation Algorithm Based on Syn[J]. 电脑与电信, 2017, 1(6): 29-30.
[7] Lei Kang. Skills and Experience of Video Editing[J]. 电脑与电信, 2016, 1(3): 87-89.
[8] Bai Jingzhong. Discussion on Earthing Design of Low-voltage Power Distribution Systems forWater Supply andWastewater Engineering[J]. 电脑与电信, 2015, 1(8): 73-76.
[9] Chen Hang. Design of Tag Recommendation System Based on Hadoop[J]. 电脑与电信, 2015, 1(7): 59-61.
[10] Xu Hui. Realization of HGTMS Card Power on Sequence Control and Voltage Monitoring[J]. 电脑与电信, 2015, 1(5): 50-54.
[11] Zhou Xiaoxiong, Dai Heming, Liu Yongxin, SuWenhui. Design and Implementation of Intangible Cultural Heritage Trading Platform Based on SaaS[J]. 电脑与电信, 2015, 1(11): 28-31.
[12] Guozhi Feng. Adobe Captivate video screens and EasyCHM software In secondary vocational schools in computer teaching applied research [J]. , 2011, 1(07): 0-0.
[13] Tian Dongju. The Applied Design of MSP430 in Automatic Constant Voltage Water Supply System[J]. , 2011, 1(05): 0-0.
[14] Xia Zhongqiu. A Brief Discussion on the Working Principle and Advantages of GPRS Network[J]. , 2010, 1(12): 0-0.
[15] Liu Bo. The Design Principle for Tuning Voltage Circuit of TV[J]. , 2010, 1(08): 0-0.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd