Cargando…

An improved NFC device authentication protocol

Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the confidentiality, performance and security of the...

Descripción completa

Detalles Bibliográficos
Autores principales: Lu, He-Jun, Liu, Dui
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8366982/
https://www.ncbi.nlm.nih.gov/pubmed/34398903
http://dx.doi.org/10.1371/journal.pone.0256367
_version_ 1783738984558493696
author Lu, He-Jun
Liu, Dui
author_facet Lu, He-Jun
Liu, Dui
author_sort Lu, He-Jun
collection PubMed
description Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the confidentiality, performance and security of the protocol. The symmetric encryption algorithm encrypts the transmission content, while the asymmetric encryption algorithm encrypts the shared key. The whole authentication process is secure, and the key distribution is secure. The improved NFC device authentication protocol can effectively resist the brute force attack, man-in-the-middle attack and replay attack in the authentication process, it can reduce the number of message transmission in the authentication process, improve the transmission efficiency, enhance the confidentiality, integrity, non-repudiation and improve the security of NFC device authentication.
format Online
Article
Text
id pubmed-8366982
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-83669822021-08-17 An improved NFC device authentication protocol Lu, He-Jun Liu, Dui PLoS One Research Article Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the confidentiality, performance and security of the protocol. The symmetric encryption algorithm encrypts the transmission content, while the asymmetric encryption algorithm encrypts the shared key. The whole authentication process is secure, and the key distribution is secure. The improved NFC device authentication protocol can effectively resist the brute force attack, man-in-the-middle attack and replay attack in the authentication process, it can reduce the number of message transmission in the authentication process, improve the transmission efficiency, enhance the confidentiality, integrity, non-repudiation and improve the security of NFC device authentication. Public Library of Science 2021-08-16 /pmc/articles/PMC8366982/ /pubmed/34398903 http://dx.doi.org/10.1371/journal.pone.0256367 Text en © 2021 Lu, Liu https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Lu, He-Jun
Liu, Dui
An improved NFC device authentication protocol
title An improved NFC device authentication protocol
title_full An improved NFC device authentication protocol
title_fullStr An improved NFC device authentication protocol
title_full_unstemmed An improved NFC device authentication protocol
title_short An improved NFC device authentication protocol
title_sort improved nfc device authentication protocol
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8366982/
https://www.ncbi.nlm.nih.gov/pubmed/34398903
http://dx.doi.org/10.1371/journal.pone.0256367
work_keys_str_mv AT luhejun animprovednfcdeviceauthenticationprotocol
AT liudui animprovednfcdeviceauthenticationprotocol
AT luhejun improvednfcdeviceauthenticationprotocol
AT liudui improvednfcdeviceauthenticationprotocol