Abstract
In order to solve the security issues existed in RFID authentication in recent years. A mutual identity authentication scheme based on dynamic is proposed after describing and analyzing the problems that RFID authentication technology encounters, which can solve replay attack, man-in-the-middle attack and other security issues. In addition, this paper also describes the techno of Authentication technology. The method proposed refers to tags privacy level between Tag and Reader to achieve mutual authentication, it not only can enhance the privacy protection of the label carrier and protect the identity privacy of the Reader holder, but also has a certain effectiveness advantage.
This work is supported by the science and technology projects of SGCC (5455HJ170001).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Cbien, H., Chen, C.: Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Comput. Stan. Interfaces 29(2), 254–259 (2016)
Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 59–66. IEEE Press (2005)
Kang, S.Y., Lee, D.G., Lee, I.Y.: A study on secure RFID mutual authentication scheme in pervasive computing environment. Comput. Commun. 31(18), 4248–4254 (2008)
Kaya, S.V., Sava, E.: Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Netw. 7(1), 136–152 (2009)
Watro, R., Kong, D., Cuti, S.F., et al: TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59–64. ACM (2004)
Perrig, A., Szewczyk, R., Tygar, J.D., et al.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)
Du, W., Wang, R., Ning, P.: An efficient scheme for authenticating public keys in sensor networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Urbana, pp. 58–67 (2005)
Ibriq, J., Mahgoub, I.: A hierarchical key establishment scheme for wireless sensor networks. In: Proceedings of 21st International Conference on Advanced Networking and Applications (AINA 2007), Niagara Falls, pp. 210–219 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhao, B., An, N., Liang, X., Ren, C., Wang, Z. (2018). A Two-Way Identity Authentication Scheme Based on Dynamic Password. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2018. Lecture Notes in Computer Science(), vol 11344. Springer, Cham. https://doi.org/10.1007/978-3-030-05755-8_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-05755-8_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05754-1
Online ISBN: 978-3-030-05755-8
eBook Packages: Computer ScienceComputer Science (R0)