2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA) 2015
DOI: 10.1109/ccitsa.2015.52
|View full text |Cite
|
Sign up to set email alerts
|

A Mutual Authentication Security RFID Protocol Based on Time Stamp

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 6 publications
0
13
0
Order By: Relevance
“…This RN must be regenerated when the next round of the online transaction is conducted, so even if this random number is obtained illegally, it cannot be used in the future transaction for verifying the transaction information in Step 5. Therefore, to some extent, this proposed protocol is capable of anti-replay [18] .…”
Section: Security Analysismentioning
confidence: 97%
“…This RN must be regenerated when the next round of the online transaction is conducted, so even if this random number is obtained illegally, it cannot be used in the future transaction for verifying the transaction information in Step 5. Therefore, to some extent, this proposed protocol is capable of anti-replay [18] .…”
Section: Security Analysismentioning
confidence: 97%
“…Recently, mutual authentication protocols in RFID systems were proposed [2,3]. In [2], a mutual authentication propocol is achieved with time stamps, hash function function and PRNG (Pseudo-Random Number Generator).…”
Section: Relative Workmentioning
confidence: 99%
“…TS1 and r2 are used in a hash function to create M5 Step 1: A reader reads an electronic tag by sending a HELO command to the tag Step 1.1: The tag creates a random number r 1 Step 1.2: The electronic tag ID TID, time stamp TS 1 , random number r 1 , and the shared key between the back-end database and the tag K x are used to create an encrypted M 1 , which is sent to the reader Step 2: The electronic tag sends M 1 to the reader Step 2.1: The reader receives M 1 and creates a random number r 2 Step 2.2: The reader ID RID, tag read request, random number r 2 , M 1 , and the shared key between the back-end database and reader K y are used to create an encrypted M 2 Step 3: The reader sends M 2 to the back-end database…”
Section: Reader Security Certificate and Role-class Architecturementioning
confidence: 99%
See 2 more Smart Citations