With the increasingly expanding application of RFID technology, the security and privacy issues of RFID system has also been a widespread concern. The existing RFID security protocol can’t simultaneously meet the requirements of low-cost, low computing, high efficiency and high security. In this paper, through the analysis of common principles and shortcomings of RFID security protocols based on Hash Function, we improve the security protocols, so as to achieve the objectives of two-way authentication. This paper theoretically proves the protocol security through BAN logic. And the new protocols can effectively solve the security and privacy problems such as replay attack, fake attack, location privacy, anonymous tags and so on. The paper proposes a kind of authentication and communication security mechanism that makes full use of the functions of the conditional Access Module (CAM) which exist in the original remote education system and when authenticating the nodes of the system, we use the proposed security scheme. Analysis showed that the mechanism is safe, reliable, strong compatibility, economic and applicable.
Bibliographical noteCompliant in UIR, dates have been updated in PURE link - see 'Other files'. Sherpa REF states accepted manuscript should be deposited in PubMed Central immediately after publication (scrnshot also added to 'Other files'). Unable to find item in PubMed Central, but further OA info added re depositing in Institutional Repositories.
- Hash Function
- Security Protocol
- BAN Logic
- Remote education system