An improved NFC device authentication protocol

PLoS One. 2021 Aug 16;16(8):e0256367. doi: 10.1371/journal.pone.0256367. eCollection 2021.

Abstract

Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the confidentiality, performance and security of the protocol. The symmetric encryption algorithm encrypts the transmission content, while the asymmetric encryption algorithm encrypts the shared key. The whole authentication process is secure, and the key distribution is secure. The improved NFC device authentication protocol can effectively resist the brute force attack, man-in-the-middle attack and replay attack in the authentication process, it can reduce the number of message transmission in the authentication process, improve the transmission efficiency, enhance the confidentiality, integrity, non-repudiation and improve the security of NFC device authentication.

Publication types

  • Research Support, Non-U.S. Gov't

MeSH terms

  • Algorithms*
  • Computer Security* / instrumentation
  • Confidentiality

Grants and funding

This work was supported by the Project of the Quality Engineering of Education Section of Anhui Province of China (2020xfxm27, 2015ckjh117, 2016mooc190, 2017ghjc228).and the Project of the Quality Engineering of Anhui Xinhua University of China (2019sysxx03) and the Project of the Cooperation between Production and Education of Ministry of Education of the People’s Republic of China (201702139041).