期刊文献+

EPC Gen2标准下强安全射频识别认证协议

Enhanced secure RFID authentication protocol for EPC Gen2
下载PDF
导出
摘要 由于现在很多射频识别(RFID)认证协议不符合EPC Class 1 Gen 2(EPC Gen2)标准的要求,同时对RFID系统的计算能力要求很高,因此很难在低端标签中实现。针对上述问题,通过分析已有协议的安全性,总结出不安全协议的缺陷,提出了一种新的基于EPC Gen2标准的RFID认证协议,并采用BAN逻辑对协议进行了安全性证明。通过安全性分析,新协议满足了信息机密性、数据完整性和身份真实性的RFID系统认证协议的安全需求。 Many current Radio Frequency IDentification(RFID) authentication protocols cannot conform with the EPC Class 1 Gen 2(EPC Gen2) standards or cannot meet the requirements of low-cost tags for the RFID authentication protocol.A new RFID authentication protocol based on the EPC Class 1 Gen 2(EPC Gen2) standards was proposed and the security proof was given with BAN logic.After analyzing the security,the proposed protocol can meet the RFID security demands: information confidentiality,data integrity and identity authentication.
出处 《计算机应用》 CSCD 北大核心 2012年第4期968-970,980,共4页 journal of Computer Applications
基金 盐城市2009年科技发展计划项目(YK2009092) 盐城工学院2010年校级科研项目(XKY2010024)
关键词 无线射频识别 前向安全 认证协议 密钥 循环冗余校验 Radio Frequency IDentification(RFID) forward secrecy authentication protocol key Cyclic Redundancy Check(CRC)
  • 相关文献

参考文献11

  • 1SARMA S E,WEIS S A,ENGELS D W.RFID systems and securi-ty and privacy implications[C]//Proceedings of CHES'02 RevisedPapers from the 4th International Workshop on Cryptographic Hard-ware and Embedded Systems.London:Springer-Verlag,2003:454-469.
  • 2SARMA S E,WEIS S A,ENGELS D W.Radio-frequency identifi-cation:Secure risks and challenges[J].RSA Laboratories Crypto-Bytes,2003,6(1):2-9.
  • 3WEIS S A,SARMA S E,RIVEST R L.Security and privacy as-pects of low-cost radio frequency identification systems[C]//Securi-ty in Pervasive Computing,LNCS 2802.Berlin:Springer-Verlag,2004:201-212.
  • 4EPCglobal.The EPCglobal architecture framework[S/OL].[2011-11-06].http://www.epcglobalinc.org/standards/architec-ture/architecture_1_3-framework-20090319.pdf.
  • 5BURROWS M,ABADI M,NEEDHAM R.A logic of authentication[J].ACM Transactions in Computer Systems,1990,9(1):18-36.
  • 6PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,TAPIADOR J E,etal.Weaknesses in two recent lightweight RFID authentication proto-cols[C]//Inscrypt'09:Proceedings of the 5th International Confer-ence on Information Security and Cryptology.Berlin:Springer-Ver-lag,2009:383-392.
  • 7CHEN C-L,DENG Y-Y.Conformation of EPC class 1 and genera-tion 2 standards RFID system with mutual authentication and privacyprotection[J].Engineering Applications of Artificial Intelligence,2009,22(8):1284-1291.
  • 8BURMESTER M,de MEDEIROS B,MUNILLA J,et al.SecureEPC Gen2 compliant radio frequency identification[C]//ADHOC-NOW'09:Proceedings of the 8th International Conference on Ad-Hoc,Mobile and Wireless Networks.Berlin:Springer-Verlag,2009:227-240.
  • 9PIRAMUTHU S.RFID mutual authentication protocols[J].Deci-sion Support Systems,2011,50(2):387-393.
  • 10邓淼磊,黄照鹤,鲁志波.EPCGen2标准下安全的RFID认证协议[J].计算机科学,2010,37(7):115-117. 被引量:5

二级参考文献10

  • 1EPC Class 1 Gen 2 standard[OL].http:∥www.epcglobalinc.org/standards/uhfc1g2/.
  • 2Duc D C,Park J,Lee H,et al.Enhancing security of EPC global Gen-2 RFID tag against traceability and cloning[C] ∥The 2006 Symposium on Cryptography and Information Security.Hiroshima:ACM Press,2006:269-277.
  • 3Chien H Y,Chen C H.Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards[J].Compu-ter Standards & Interfaces,2007,26(2):254-259.
  • 4Cai Q L,Zhan Y J,Wang Y H.A minimalist mutual authentication protocol for RFID system & BAN logic analysis[C] ∥ISECS International Colloquium Computing,Communication,Control,and Management.Guangzhou:IEEE Press,2008:449-453.
  • 5Choi E Y,Lee D H,Lin J.Anti-cloning protocol suitable to EPC global Class-1 Generation-2 RFID systems[J].Computer Standards & Interfaces,2009,31(6):1124-1130.
  • 6Seo D H,Baek J M,Cho D S.Secure RFID authentication scheme for EPC Class Gen2[C] ∥International Conference on Ubiquitous Information Management and Communication.Suwon:IEEE Press,2009:221-227.
  • 7Sun H M,Ting W C.A Gen2-based RFID authentication protocol for security and privacy[J].IEEE Transactions on Mobile Computing,2009,8(1):1-11.
  • 8Burmester M,Munilla J.A flyweight RFID authentication protocol[OL].http:∥eprint.iacr.org/2009/212.pdf.
  • 9Rotter P.A framework for assessing RFID system security and privacy risks[J].Pervasive Computing,2008,7(4):70-77.
  • 10张辉,侯朝焕,王东辉.一种基于部分ID的新型RFID安全隐私相互认证协议[J].电子与信息学报,2009,31(4):853-856. 被引量:18

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部