원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.10 No.3
2016.03
pp.369-382
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
To meet the special needs of RFID, it is proposed to use a coupled dynamic integer tent map lattices model (DCML) to implement a Hash function and a random number generation scheme. The scheme is featured with fast operation. Based on this, this paper proposes RFID bi-directional authentication protocol. This has strictly proved by BAN logic. This protocol can resolve eavesdropping, illegal access, location tracking, impersonation and replay attack.
목차
Abstract
1. Introduction
2. Coupled Dynamic Integer Tent Map Lattices
2.1 Dynamic Integer Tent Map
2.2 Dynamic Coupled Integer Tent Map Lattices Model (DCML)
2.3 DCML is used to Build Hash Function and Generate Random Numbers
3. RFID Bi-Directional Authentication Protocol based on Random Numbers and Hash Function
3.1 Authentication Process
3.2 Performance Analysis
3.3 Performance Comparison
4. The Proof of BAN Logic
4.1 Primary Inference Rule
4.2 Proof of Protocol
5. Conclusion
Acknowledgements
References
1. Introduction
2. Coupled Dynamic Integer Tent Map Lattices
2.1 Dynamic Integer Tent Map
2.2 Dynamic Coupled Integer Tent Map Lattices Model (DCML)
2.3 DCML is used to Build Hash Function and Generate Random Numbers
3. RFID Bi-Directional Authentication Protocol based on Random Numbers and Hash Function
3.1 Authentication Process
3.2 Performance Analysis
3.3 Performance Comparison
4. The Proof of BAN Logic
4.1 Primary Inference Rule
4.2 Proof of Protocol
5. Conclusion
Acknowledgements
References
키워드
저자정보
참고문헌
자료제공 : 네이버학술정보