Research on the Security Authentication Mode of MF1 S50 Electronic Tag
Abstract
This paper expatiates the security authentication mechanism of the MF1 S50 electronic tag most widely used at present, and flexibly sets its keys and access bits to meet different application environment requirements. On this basis, this paper further discusses the basic types and setting methods of the security authentication mode of the electronic tag, so as to provide guidance for the application developers to choose different security authentication modes according to different requirements.
Keywords
Full Text:
PDFReferences
Yu Lei. Logistics Management System of Internet of Things based on RFID electronic tags [J]. Microcomputer Information, 2006 (02).
Ma Yujian. Design and implementation of the signature system based on the electronic tag system [D]. Masters’ Theses of North China University of Technology, 2009CNKI
Ouyang Changqing, Huang Sheng Ye & Liu Wanfang. Overview of security problems of low cost RFID [J]. Network Security Technology & Application, 200
Xiao Feng. Research and design of the security protocol for electronic tags of Internet of Things [D]. Masters’ Theses and Doctoral Theses of Beijing University of Posts and Telecommunications, 2013CNKI
Tian Yun. Research on some problems in the identification of passive electronic tags. [D]. Doctoral Theses of Shanghai Jiao
tong University, 2013CNKI
Zhao Kewen. Research on security of electronic tags and applications thereof in logistics [D]. Masters’ Theses of Xidian University, 2006CNKI
Wang Lung & Peng Sheqiang. Research on RFID multi-authentication protocol and security analysis [J]. Journal of Computer Applications, 2013, (S2)
Xiao Feng. Research on anti-collision algorithm and security authentication protocol in RFID system. Masters’ Theses of Beijing Institute of Technology, 2014CNKIHammond DC. Neuro feedback with anxiety an ad affective disorders. J Child Adolesc Psychiatr Clin N Am, 2005, 14:105_123.
DOI: https://doi.org/10.18686/esta.v4i1.42
Refbacks
- There are currently no refbacks.
Copyright (c) 2017 Zhiliang Xiao
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.