Page Header

Research on the Security Authentication Mode of MF1 S50 Electronic Tag

Zhiliang Xiao


This paper expatiates the security authentication mechanism of the MF1 S50 electronic tag most widely used at present, and flexibly sets its keys and access bits to meet different application environment requirements. On this basis, this paper further discusses the basic types and setting methods of the security authentication mode of the electronic tag, so as to provide guidance for the application developers to choose different security authentication modes according to different requirements.


Electronic Tag, Security Authentication, Mode

Full Text:



Yu Lei. Logistics Management System of Internet of Things based on RFID electronic tags [J]. Microcomputer Information, 2006 (02).

Ma Yujian. Design and implementation of the signature system based on the electronic tag system [D]. Masters’ Theses of North China University of Technology, 2009CNKI

Ouyang Changqing, Huang Sheng Ye & Liu Wanfang. Overview of security problems of low cost RFID [J]. Network Security Technology & Application, 200

Xiao Feng. Research and design of the security protocol for electronic tags of Internet of Things [D]. Masters’ Theses and Doctoral Theses of Beijing University of Posts and Telecommunications, 2013CNKI

Tian Yun. Research on some problems in the identification of passive electronic tags. [D]. Doctoral Theses of Shanghai Jiao

tong University, 2013CNKI

Zhao Kewen. Research on security of electronic tags and applications thereof in logistics [D]. Masters’ Theses of Xidian University, 2006CNKI

Wang Lung & Peng Sheqiang. Research on RFID multi-authentication protocol and security analysis [J]. Journal of Computer Applications, 2013, (S2)

Xiao Feng. Research on anti-collision algorithm and security authentication protocol in RFID system. Masters’ Theses of Beijing Institute of Technology, 2014CNKIHammond DC. Neuro feedback with anxiety an ad affective disorders. J Child Adolesc Psychiatr Clin N Am, 2005, 14:105_123.



  • There are currently no refbacks.

Copyright (c) 2017 Zhiliang Xiao

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.