期刊文献+

针对RFID身份认证协议——ARAP协议的攻击及改进 被引量:6

Attack and Improvement on ARAP protocol—A Novel RFID Authentication Protocol Providing Strong Privacy and Security
下载PDF
导出
摘要 证明了针对匿名RFID身份认证协议ARAP协议可以进行假冒伪造攻击,并提出了改进版的ARAP协议。攻击的实质在于协议中运用的异或运算会将相同的值消去,或者可以设计特定的随机数实现重放攻击。提出了一种新的运算操作———置换操作,并在改进版的ARAP协议中将原协议的部分异或运算改为置换操作。改进版的ARAP协议还能抵抗跟踪攻击、非同步攻击和重放攻击等。 It is proved that the novel anonymous ble to counterfeiting and impersonating attacks. RFID authentication protocol ARAP protocol is vulnera- In addition, an improved version of ARAP protocol is proposed to make up this imperfection. The attacks are caused by the XOR operations used in ARAP. The value will be eliminated by XORing with itself. Moreover, past information outputted by the protocol can be reused by exploiting the XOR operation. Therefore, a new operation called permutation is pro- posed. In the improved version of ARAP protocol, some XOR operations are substituted by permutation operations. The improved ARAP protocol is also resistant to tracking attacks, de-synchronization attacks and replay attacks.
出处 《中国电子科学研究院学报》 2011年第6期556-560,共5页 Journal of China Academy of Electronics and Information Technology
基金 国家自然科学基金(61071078)
关键词 无线射频识别 身份认证协议 假冒伪造攻击 ARAP协议 置换操作 RFID authentication protocol counterfeiting and impersonating attacks ARAP protocol permutation operation
  • 相关文献

参考文献5

  • 1JUELS A. RFID Security and Privacy: A Research Sur- vey [J]. IEEE Journal on Selected Areas in Communica- tions, 2006, 24(2): 381-394.
  • 2WEISS A, SARMA S E, RIVEST R L, ENGELS D W. Security and Privacy Aspects of Low-Cost Radio Frequen- cy Identification Systems [ C ]. First International Confer- ence on Security in Pervasive Computing,2003:201-212.
  • 3SHEN J, CHOI D, MOH S, CHUNG I. A Novel Anony- mous RFID Authentication Protocol Providing Strong Pri- vacy and Security [ C ]. 2010 International Conference on Multimedia Information Networking and Security, 2010: 584-588.
  • 4KARTHIKEYAN S, NESTERENKO M. RFID Security with- out Extensive Cryptography [ C ]. The Third ACM Work- shop Security of Ad Hoc and Sensor Networks, 2005 : 63- 67.
  • 5SUN H M, TING W C, WANG K H. On the Security of Chien' s Ultralightweight RFID Authentication Protocol [J]. IEEE Transactions on Dependable and Secure Com- puting, 2011, 8(2): 315-317.

同被引文献61

  • 1王张宜,李波,张焕国.Hash函数的安全性研究[J].计算机工程与应用,2005,41(12):18-19. 被引量:26
  • 2王爱明,李艾华,穆晓曦.用Hash锁方法解决RFID的安全与隐私问题[J].中国防伪报道,2006(10):43-47. 被引量:2
  • 3李雄.多种环境下身份认证协议的研究与设计[D].北京:北京邮电大学,2012.
  • 4杜丰.韩博.杨洁,等.基于SQLServerMobile与RFID的身份认证设计与实现[J].实验技术与管理,2011,28(5):260-261.
  • 5MAHDIN H,ABAWAJY J.An approach for removing redundant data from RFID data streams[J].Sensors, 2011, 11 (10) : 9863 -9877.
  • 6FERNANDO H, ABAWAJY J.Securing RFID systems from SQEIA[C].Algorithms and architectures for parallel processing.Springer Berlin Heidelberg.2011 : 245-254.
  • 7ABAWAJY J.SQLIA detection and prevention approach for RFID systems[J].Journal of Systems and Software,2013,86 (3) : 751-758.
  • 8DOGBE E,MILLHAM R,SINGH P.A combined approach to prevent SQL injection attacks[C].Science and Information Conference (SAI), 2013. IEEE, 2013 : 406- 410.
  • 9ABAWAJY J,FERNANDO H.Policy-based SQLIA detection and prevention approach for RFID svstems[J].Computer Standards & Interfaces, 2015,38(3) : 64-71.
  • 10LEE I,JEONG S,YEO S,et al.A novel method for SQL injection attack detection based on removing SQI, query attribute values[J].Mathematical and Computer Modelling, 2012,55(1):58-68.

引证文献6

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部