Title :
Analysis and Optimization to an NFC Security Authentication Algorithm Based on Hash Functions
Author :
Zai-Jiao Zhuang ; Jin Zhang ; Wei-Dong Geng
Author_Institution :
Key Lab. of Photo-Electron. Thin Film Devices & Tech. of Tianjin, Nankai Univ., Tianjin, China
Abstract :
Currently, NFC security authentication solutions widely use third-party authentication platforms, but their high cost and power consumption are not conducive to popularize NFC technology. To solve this problem, this paper presents a security authentication algorithm entirely based on a Hash function. It is an independent and complete algorithm without the aid of third-party certification platform. The main research process is transplanting an authentication algorithm in RFID, and then applying it to the NFC field after a wide range of optimization and improvement. This paper first changes the initiating mechanism to reduce the system error rate and save the power consumption of initiating device. Then, it removes some key data to save the storage resources. This scheme doesn´t reduce the level of security. At last, the improved algorithm is simulated by Java Socket to obtain a kind of wider adaptability among devices. Experimental results from the simulation show that, the method can maintain the safety performance, improve efficiency and save storage space. It can be competent for the application in the relevant field, such as micro-payment, access controlling, etc.
Keywords :
authorisation; cryptography; near-field communication; radiofrequency identification; telecommunication security; Java Socket; NFC field; NFC security authentication algorithm; RFID; access controlling; efficiency improvement; hash functions; initiating mechanism; micro-payment; near field communication; power consumption save; safety performance; storage resource saving; storage space saving; system error rate reduction; third-party authentication platforms; Algorithm design and analysis; Authentication; Certification; Nickel; Radiofrequency identification; Servers; Authentication; Hash Functions; NFC; Security of Information; Storage;
Conference_Titel :
Wireless Communication and Sensor Network (WCSN), 2014 International Conference on
Print_ISBN :
978-1-4799-7090-2
DOI :
10.1109/WCSN.2014.56