期刊文献+

一种适合于低成本标签的RFID双向认证协议 被引量:7

New RFID mutual authentication protocol for low-cost tags
下载PDF
导出
摘要 在分析现有一些RFID认证协议的基础上,提出了一种新的适合低成本标签的双向认证协议,并对其进行了SMV模型检测形式化证明和性能分析。结果表明该认证协议具有认证性、保密性和完整性,能够满足低成本标签的安全需求,并且在安全性能提高的同时仍具有较好的执行性能。 Based on the analysis of some existing RFID authentication protocols, this paper proposed a new mutual authentication protocol for low-cost tags, and did the formal proof using SMV model checking and performance analysis of this protocol. The results show that the authentication protocol satisfies the requirements of authentication, confidentiality and integrity, and can meet the security needs of low-cost tags, in addition, the scheme also has a good performance.
出处 《计算机应用研究》 CSCD 北大核心 2010年第5期1885-1888,共4页 Application Research of Computers
关键词 低成本标签 射频识别 安全协议 认证 SMV模型检测 low-cost tags RFID(radio frequency identification) security protocol authentication SMV model checking
  • 相关文献

参考文献14

  • 1KARTHIKEYAN S,NESTERENKO M.RFID security without extensive cryptography[C]// Proc of ACM Workshop on Security of Ad hoc and Sensor Networks.Alexandria,VA:ACM,2005:63-67.
  • 2EPCTM Radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860MHz~960MHz version 1.0.9[S].2005.
  • 3DUC D N,PARK J,LEE H,et al.Enhancing security of EPCglobal GEN-2 RFID tag against traceability and cloning[C]// Proc of Symposium on Cryptography and Information Security.2006.
  • 4CHIEN H Y,CHEN C H.Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards[J].Computer Standards & Interfaces,2007,29(2):254-259.
  • 5PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,TAPIADOR,et al.Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard[J].Computer Standards & Interfaces,2009,31(2):372-380.
  • 6KONIDALA D M,KIM K.Auto-ID labs white paper WP-HARDWARE033,RFID tag-reader mutual authentication scheme utilizing tag's access password[S].2007.
  • 7LIM T L,LI T.Addressing the weakness in a lightweight RFID tag-reader mutual authentication scheme[C]// Proc of IEEE Int'l Global Telecommunications Conference(GLOBECOM).2007:59-63.
  • 8KONIDALA D M,KIM Z,KIM K.A simple and cost-effective RFID tag-reader mutual authentication scheme[C]// Proc of RFIDSec.2007:141-152.
  • 9PERIS-LOPEZ P,LI Tie-yan,LIM T-Lee,et al.Vulnerability analysis of a mutual authentication scheme under the EPC Class-1 Generation-2 Standard[C]// Proc of RFIDsec.2008:9-11.
  • 10CHIEN H Y.SASI:a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity[J].IEEE Trans on Dependable and Secure Computing,2007,4(4):337-340.

同被引文献46

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2李建华,张爱新,薛质.网络安全协议的形式化分析与验证[M].北京:机械工业出版社,2010.
  • 3PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, ESTEVEZ-TAPIADOR J M, et al. Cryptanalysis of a novel authentication protocol conforming to EPC-C1 G2 standard [J]. Computer Standards and Interfaces, 2009, 31(2): 372-380.
  • 4HAN D, KWON D. Vulnerability of an RFID authentication protocol conforming to EPC Class-1 Generation-2 standards [ J]. Computer Standards and Interfaces, 2009, 31(4):648-652.
  • 5van LE T, MIKE BURNMESTER, BRENO DE MEDEIROS. Universally composable and forward-secure RFID authentication and authenticated key exchange [ C]// Proceedings of the Second ACM Symposium on Information. Computer and Communications Security. New York: ACM Press, 2007:242 -252.
  • 6DUC D N, KIM K. Defending RFID authentication protocol against DoS attacks [J]. Computer Communications, 2011, 34(3): 384-390.
  • 7AVOINE G. Adversarial model for radio frequency identification [ EB/OL]. (2005-01-01) [2010-05-15]. http://eprint, iacr. org.
  • 8张志强.啤酒酿造技术概要[M].北京:中国轻工业出版社,1996..
  • 9谷大武,徐胜波.高级加密标准(AES)算法-Rijndael的设计[M].北京:清华大学出版社,2003.
  • 10Poschmann A, Leander G, Schramm K. New Light-weight Cryptographic Algorithms for RFID [C]// IEEE International Symposium on Circuits and Systems. New Orleans. New Orleans, LA.. IEEE Press, 2007:1843-1846.

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部