期刊文献+

结合Hash函数和密钥阵列的RFID安全认证协议 被引量:8

RFID authentication protocol based on Hash function and key array
下载PDF
导出
摘要 无线传输、信号广播、资源受限等特点使无线射频识别(RFID)技术存在潜在的安全隐患。在分析目前常见的RFID认证协议基础上,提出一种结合单向Hash函数和密钥阵列的安全认证协议。新协议在认证过程中使用单向Hash函数值代替标签标识符ID,并为每一对阅读器和标签之间设计独立的认证密钥,在抵抗包括窃听、位置跟踪、重传攻击、拒绝服务和篡改等多种攻击的基础上,进一步增强了标签信息的私密性,对抵御来自系统内部的威胁具有明显的优势。 Wireless transmission, broadcast of signals, disturb the reliability of Radio Frequency Identification (RFID) system and block the deployment progress of RFID techniques. Through the analysis of current common RFID authentication protocol, an authentication protocol based on Hash function and key array was proposed. The new protocol used one-way Hash function value instead of label identifier, and designed independent authentication key for each pair between the reader and the tag in the certification process. It could resist several possible attacks, including eavesdropping, location tracking, re-transmission attacks, Denial of Service (DOS), tampering and other attacks. It has obvious advantages in enhancing the tag identity privacy, and resisting the threat from within the system.
作者 谢川
出处 《计算机应用》 CSCD 北大核心 2011年第3期805-807,811,共4页 journal of Computer Applications
基金 重庆市科技攻关项目(CSTC2010AA2036)
关键词 无线射频识别 标签 阅读器 后台服务器 认证协议 哈希函数 Radio Frequency Identification (RFID) tag reader back-end server authentication protocol Hash function
  • 相关文献

参考文献9

二级参考文献93

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2欧阳麒,蒋兴浩,孙锬锋.一种基于相互认证的安全RFID系统[J].信息安全与通信保密,2006,28(12):142-144. 被引量:14
  • 3Yao Jun Zeng Guihua.Enhanced NTRU cryptosystem eliminating decryption failures[J].Journal of Systems Engineering and Electronics,2006,17(4):890-895. 被引量:3
  • 4曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 5International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 6Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 7Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 8Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 9Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 10Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84

共引文献286

同被引文献88

引证文献8

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部