z-logo
open-access-imgOpen Access
An improved NFC device authentication protocol
Author(s) -
He-Jun Lu,
Dui Liu
Publication year - 2021
Publication title -
plos one
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.99
H-Index - 332
ISSN - 1932-6203
DOI - 10.1371/journal.pone.0256367
Subject(s) - computer science , authentication protocol , data authentication algorithm , challenge–response authentication , replay attack , computer security , computer network , encryption , symmetric key algorithm , hash function , challenge handshake authentication protocol , authentication (law) , public key cryptography
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the confidentiality, performance and security of the protocol. The symmetric encryption algorithm encrypts the transmission content, while the asymmetric encryption algorithm encrypts the shared key. The whole authentication process is secure, and the key distribution is secure. The improved NFC device authentication protocol can effectively resist the brute force attack, man-in-the-middle attack and replay attack in the authentication process, it can reduce the number of message transmission in the authentication process, improve the transmission efficiency, enhance the confidentiality, integrity, non-repudiation and improve the security of NFC device authentication.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here