期刊文献+

基于口令认证的RFID系统安全协议及其BAN逻辑分析 被引量:1

A Security Protocol of RFID System Based on Password & BAN Logic Analysis
下载PDF
导出
摘要 本文提出一种新的基于口令认证的RFID系统安全协议。该方法充分利用RFID低等级标签提供的有限资源:访问口令(PW)、标签的标识码(ID)和伪随机函数等建立RFID系统读写器和标签双向认证的安全协议,对该协议抵抗各种攻击的安全性进行理论分析并对该协议的认证功能进行BAN逻辑的形式化分析。结果表明该协议能够有效抵御在线和离线字典攻击、伪装攻击、重放攻击以及流量分析和跟踪攻击,因而解决了RFID系统的安全问题。 A new security protocol of RFID system is proposed based on password. The scheme makes sufficiently use of the limited resources of RFID system: PW(access password), ID(tag identifier), PRNG(pseudo-random number generator) to create the security protocol of RFID system with mutual authentication between readers and tags. Then performance analysis is given against various security attacks and BAN logic analysis of the security of the protocol. The results demonstrate that the protocol can effectively resist the online and offline dictionary attacks, disguise attacks, replay attacks and the traffic analysis and tracking attacks, thus solves the security problem of RFID system.
出处 《电信科学》 北大核心 2008年第12期44-48,共5页 Telecommunications Science
基金 广东省自然基金资助项目(No.06023131) 中山大学"985"二期基金资助项目(No.90013-3272240)
关键词 无线通信 安全协议 口令 字典攻击 BAN逻辑 wireles communication, security protocol, password, dictionary attack, BAN logic
  • 相关文献

参考文献12

  • 1Sarma S E, Weis S A, Engels D W. RFID systems and security and privacy implications. Lectures Notes in Computer Science 2523, Berlin: Springer-Verlag, 2003:454-469
  • 2Sarma S E, Weis S A, Engels D W. Radio-frequency identification: secure risks and challenges. RSA Laboratories Cryptobytes, 2003, 6(1): 2-9
  • 3Weis S A, Sarma S E, Rivest R L. Security and privacy aspects of low-cost radio frequency identification systems. Lectures Notes in Computer Science 2802, Berlin: Springer-Verlag, 2004:201-212
  • 4Ohkubo M, Suzuki K, Kinoshita S. Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai, 2004
  • 5Rhee K, Kwak J, Kim S. Challenge-response based RFID authentication protocol for distributed database environment. Lectures Notes in Computer Science 3450,Berlin: Springer-Verlag, 2005:78-84
  • 6Molnar D, Wagner D. Privacy and security in library RFID: issues,practices, and architectures. In: Proceedings of the llth ACM Conference on Computer and Communications Security (CCS 2004), Washington, DC, USA, Oct 2004
  • 7Lee S M, Hwang Y J, Lee D H. Efficient authentication for low-cost RFID systems. Lectures Notes in Computer Science 3450, Berlin: Springer-Verlag, 2005:619-627
  • 8K arthikeyan S, Nesterenko M. RFID security without ettensive cryptography, In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, USA,Nov 2005
  • 9Masataka S, Kazukuni K, Hideki I. Privacy enhanced and light weight RFID system without tag synchronization and ethanstive search. In: Proceedings of 2006 IEEE International Conference on Systems, Man, and Cybernetics,Taipei, Taiwan, China,Oct 2006
  • 10EPCglobal, Version 1.1 Rev 1.24. EPC tag data standards, http:// www.epcglobalinc.org

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部