期刊文献+

一种实用的轻量级RFID安全协议研究 被引量:5

Research of a Practical Lightweight RFID Security Protocol
下载PDF
导出
摘要 RFID的安全问题是RFID应用中的关键问题之一。RFID标签计算资源有限,因此旨在研究一种轻量级且具有一定安全性的RFID安全协议,使得标签端的协议不包含复杂的加密操作,只包含异或和简单逻辑控制。证明了"RFID标签最小限度密码算法"存在弱点,并针对该弱点提出了信道加密等3点改进方法,改进后攻击者不能直接计算密码而需强力攻击。实验结果表明,改进后,破解所需时间和所需记录数都增加,且破解难度随着信道密码长度的增加呈指数增加而加密复杂度呈线性增加。另外改进后对硬件需求的增加不多。该协议有助于在低成本RFID标签上实现较高安全性的RFID安全协议。 RFID security is a key issue in RFID application. According to limited computational resources of RFID tags, we aimed to design a lightweight RFID security protocol with appropriate security, which has no complicated cryptographic operations in the tag side, but only XOR and simple logical control. The paper proved that there is weakness in "Minimalist Cryptography for Low-Cost RFID Tags", and according to this weakness, the paper promoted three methods, including channel encryption. Attackers can't compute the key directly with the improved protocol, but must resort to brute-force search. The experimental result showed that the cracking time and the record number needed for cracking increased with improved protocol, and the cracking difficulty increases exponentially when the length of channel key increases,but the encryption complication increases in linear. Furthermore, the hardware requirement doesn 't increase much. The protocol helps to realize relatively high security in low-cost RFID tags.
出处 《计算机科学》 CSCD 北大核心 2009年第6期105-107,118,共4页 Computer Science
基金 天津市自然科学基金项目(06YFJMJC00200)资助
关键词 RFID 安全 隐私 轻量级 RFID,Security,Privacy, Lightweight
  • 相关文献

参考文献12

  • 1Juels A. RFID Security and Privacy : A Research Survey [ J ]. IEEE Journal on Selected Areas in Communications, 2006, 24 (2):381-394
  • 2中华人民共和国科学技术部等十五部委.中国射频识别(RFID)技术政策白皮书.2006-06-09[OL].http://www.eetchina.com/ARTICLES/2006JUN/PDF/CHINARFIDWHITEPAPERPDF
  • 3Feldhofer M, Dominikus S, Wolkerstorfer J. Strong Authentication for RFID Systems Using the AES Algorithm[C]//Cryptographic Hardware and Embedded Systems- CHES 2004-6th Int' l Workshop, LNCS 3156. Springer, 2004: 357-370
  • 4Sarma S E, Weis S A, Engels D W. Radio-frequency-identification security risks and challenges[J].CryptoBytes, 2003, 6 (1)[OL]. http:// www. rsasecufity.com/rsalabs/cryptobytes/CryptoBytes_Mareh_2003_lowres. pdfJHJsearch = % 22Radiofrequency-identification% 20security% 20risks% 20and% 20challenges%22
  • 5Juels A, Pappu R. Squealing Euros:Privacy protection in RFIDenabled banknotes[C] //R. Wright, ed. Fmancial Cryptography ' 03, volume 2742 of Lecture Notes in Computer Science. Springer-Verlag, 2003: 103-121
  • 6Sarma W S,Rivest R,Engels D. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems[C]//1st Intern. Conference on Security in Pervasive Computing (SPC). 2003: 454-469
  • 7Ohkubo M, Suzuki K, Kinoshita S. Cryptographic Approach to Privacy-friendly Tags[C] // RFID Privacy Workshop. MIT, 2003
  • 8Avoine G , Oechslin P. A Scalable and Provably Secure Hash Based RFID Protocol [C]//the 2nd IEEE International Workshop on Pervasive Computing and Communication Security (PerSec), 2005 [OL]. http:// lasecwww. epfl. ch/puh/lasec/ doc/AO05. pdfJHJsearch =% 22filetype% 3Apdf% 20A% 20Scalahle% 20and% 20Provably% 20Secure% 20Hash% 20Based% 20RFID% 20Protocol% 22
  • 9Dimitriou T. A Lightweight RFID protocol to protect against Traceability and Cloning attacks[C]// IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks,SECURECX)MM Z005[OL]. http: ffwww. air. edu. gr/faculty/T_Dimitriou_files/RFID-secureeomm05, pdfJHJsearch =% 22filetype% 3Apdf% 20A% 201Lightweight% 20RFID% 20protocol% 20to% 20protect% 20against% 20Traceability% 20and% 20Cloning%20attaeks % 22
  • 10周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211

二级参考文献28

  • 1Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 2Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 3Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 4Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 5Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 6Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 7Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 8Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 9Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
  • 10Saito J,Ryou J.C,Sakurai K..Enhancing privacy of universal re-encryption scheme for RFID tags.In:Yang L.T,Guo M,Gao G.R,Jha N.K.eds..Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2004).Lectures Notes in Computer Science 3207.Berlin:Springer-Verlag,2004,879~890

共引文献210

同被引文献42

  • 1朱炜玲,喻建平.物联网移动RFID系统隐私保护方案[J].系统工程理论与实践,2011,31(S2):119-123. 被引量:5
  • 2赵克文,寇卫东,肖玉霞.基于分级思想的射频识别技术安全认证过程的研究[J].电子科技,2006,19(8):7-11. 被引量:1
  • 3梁杰,来学嘉.Improved Collision Attack on Hash Function MD5[J].Journal of Computer Science & Technology,2007,22(1):79-87. 被引量:12
  • 4JUELS A, WEISS A. Define strong privacy for privacy for RFID [ C]// Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops. Washington, DC: IEEE Computer Society, 2007:342-347.
  • 5RHEE K, KWAK J, KIM S, et al. Challenge-response based RFID authentication protocol for distributed database environment [ C]// SPC 2005: Proceedings of the Second International Conference on Security in Pervasive Computing, LNCS 3450. Berlin: Springer, 2005:70 - 84.
  • 6HA J H, MOON S J, ZHOU J Y, et al. A new formal proof model for RFID location privacy [ C]// ESORICS'08: Proceedings of the 13th European Symposium on Research in Computer Security, LNCS 5283. Berlin: Springer, 2008:267-281.
  • 7van DEURSEN T, RADOMIROVIC S. On a new formal protocol model for RFID location privacy [ J]. Information Processing Let- ters, 2009, 110(2): 57-61.
  • 8SHOUP V. Sequences of games: A tool for taming complexity in se- curity proofs [ EB/OL]. (2006 - 01 - 01) [ 2010 - 05 - 20]. ht- tp://eprint. iacr. org/2004/332. Revised.
  • 9AVOINE G. Adversarial model for radio frequency identification [ EB/OL]. (2005 - 01 - 01 ) [ 2010 - 05 - 15]. http://eprint. Ia-cr. org.
  • 10MOLNAR D, WAGNER D. Privacy and security in library RFID, issues, practices and architectures [ C]// ACM Conference on Com- munications and Computer Security. New York: ACM Press, 2004: 210 -219.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部