Analysis shows that this protocol resists spoofing , tracking , eavesdropping impersonation and replay attack and it is low-cost , high-efficiency and good-security .
Applications of our system are manifold : prevention of source address spoofing , DDoS attack mitigation , distributed firewall-like filtering , collecting traffic statistics , traceback , distributed network debugging , support for forensic analyses and many more .
Through taking in the random hash lock with one-way Hash function , renewing the tag ’ s key value in each communication process and encrypting the data transported between tags and reader by Hash function , this approach efficiently prevents unauthorized reading , location track , wiretapping , counterfeit and spoofing , replay attack and so on .