| Literature DB >> 34398903 |
Abstract
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the confidentiality, performance and security of the protocol. The symmetric encryption algorithm encrypts the transmission content, while the asymmetric encryption algorithm encrypts the shared key. The whole authentication process is secure, and the key distribution is secure. The improved NFC device authentication protocol can effectively resist the brute force attack, man-in-the-middle attack and replay attack in the authentication process, it can reduce the number of message transmission in the authentication process, improve the transmission efficiency, enhance the confidentiality, integrity, non-repudiation and improve the security of NFC device authentication.Entities:
Mesh:
Year: 2021 PMID: 34398903 PMCID: PMC8366982 DOI: 10.1371/journal.pone.0256367
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Identifiers and explanations used in the protocol.
| Identifier | Interpretative Statement |
|---|---|
|
| N is NFC device, i is NFC device number |
|
| Authentication Server |
|
| Asymmetric Encryption Algorithm |
|
| Symmetric Encryption Algorithm (Shared key encryption algorithm) |
|
| Public key of AS |
|
| Private key of AS |
|
| The Shared key between Ni and AS |
|
| Hash Encryption Algorithm |
|
| The random number generated by Ni |
|
| The random number generated by AS |
|
| The survival period of Ni |
|
| Timestamps |
Fig 1The working process of the registration phase.
Fig 2The working process in the authentication phase.
Comparison of confidentiality and performance analysis.
| Operating | Our scheme | Lee et al. | Ceipidor et al. | Thammarat et al. | Tung et al. |
|---|---|---|---|---|---|
|
| 8 | 4 | - | 3 | - |
|
| 6 | 1 | 2 | - | - |
|
| 8 | 3 | 3 | 9 | 9 |
|
| 6 | 8 | 7 | 8 | 7 |
Comparison of safety analysis.
| Security | Our study | Lee et al. | Ceipidor et al. | Thammarat et al. | Tung et al. |
|---|---|---|---|---|---|
|
| Yes | No | No | No | No |
|
| Yes | - | - | Yes | Yes |
|
| Yes | No | No | Yes | Yes |
|
| Yes | - | - | Yes | Yes |
|
| Yes | No | - | Yes | Yes |
|
| Yes | - | Yes | Yes | Yes |
Note that the "-" in the table indicates that this study claims that the solution can provide this security attribute, but other studies believe that the solution still lacks this security attribute.