期刊文献+

轻量级无线射频识别认证协议的改进 被引量:1

Improvement of Lightweight RFID Authentication Protocol
下载PDF
导出
摘要 Kardas等人提出的轻量级无线射频识别(RFID)认证协议(2011年LightSec会议论文集)若遭遇侧信道分析、物理刺探等攻击会导致密钥泄漏,从而使整个协议认证失败。为此,通过将四步认证改为三步认证、引入密钥恢复机制以及改进密钥的使用方式,使协议效率提高,并且便于在多标签环境中扩展。理论分析结果表明,新协议可以防止读写器与标签之间产生异步,抵抗伪造攻击、重放攻击、消息阻塞攻击、中间人攻击,与原方案相比,认证效率更高。 Kulseng et al's lightweight Radio Frequency Identification(RFID) authentication protocol has secret loophole that it may cause key leakage if the protocol is attacked by side channel analysis, which leads authentication failure. This paper modifies four-step authentication to three-step authentication, introduces key recovery mechanism and improves usage of key, so that the protocol has higher efficiency, and it is convenient to expend in multi-tag environment. Theory analysis result shows that the new protocol can prevent various attacks, and it is more eff^cient compared with the original protocol.
出处 《计算机工程》 CAS CSCD 2012年第14期5-7,12,共4页 Computer Engineering
基金 国家自然科学基金资助项目(61170263)
关键词 认证协议 轻量级 无线射频识别 物理防克隆函数 线性反馈移位寄存器 authentication protocol lightweight Radio Frequency Identification(RFlD) Physical Unclonable Function(PUF) Linear Feedback Shift Register(LFSR)
  • 相关文献

参考文献11

  • 1Pappu R, Recht B, Taylor J, et al. Physical One-way Functions[J]. Science, 2002, 297(5589): 2026-2030.
  • 2Riihrmair U, Sehnke F, S6lter J, et al. Modeling Attacks on Physical Unclonable Functions[C]//Proc. of the 17th ACM Conference on Computer and Communications Security. Chicago, Illinois, USA: ACM Press, 2010.
  • 3Kulseng L, Yu Zhen, Wei Yawen, et al. Lightweight Mutual Authentication and Ownership Transfer for RFID Systems[C]// Proc. of INFOCOM'10. [S. 1.]: IEEE Press, 2010.
  • 4周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 5Ranasinghe D, Engels D, Cole P. Security and Privacy: Modest Proposals for Low-cost RFID Systems[C]//Proc. of Intelligent Sensors, Sensor Networks and Information Processing Conference. [S. 1.]: IEEE Press, 2004.
  • 6Tuyls P, Batina L. RFID-tags for Anti-counterfeiting[C]//Proc. of CT-RSA'06. San Jose, USA: [s. n.], 2006.
  • 7Bolotnyy L, Robins G. Physically Unclonable Function-based Security and Privacy in RFID Systems[C]//Proc. of the 5th AnnualIEEE International Conference on Pervasive Computing and Communications. [S. 1.]: IEEE Press, 2007.
  • 8Oztiirk E, Hammouri G, Sunar B. Towards Robust Low Cost Authentication for Pervasive Devices[C]//Proc. of the 6th Annual IEEE International Conference on Pervasive Computing and Communications. [S. 1.]: IEEE Press, 2008.
  • 9Cortese P F, Gemmiti F, Palazzi B, et al. Efficient and Practical Authentication of PUF-based RFID Tags in Supply Chains[C]// Proc. of IEEE International Conference on RFID Technology and Applications. [S. 1.]: IEEE Press, 2010.
  • 10Choi W, Kim S, Kim Y, et al. PUF-based Encryption Processor for the RFID Systems[C]//Proc. of the 10th International Conference on Computer and Information Technology. [S. 1.]: IEEE Press, 2010.

二级参考文献28

  • 1Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 2Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 3Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 4Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 5Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 6Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 7Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 8Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 9Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
  • 10Saito J,Ryou J.C,Sakurai K..Enhancing privacy of universal re-encryption scheme for RFID tags.In:Yang L.T,Guo M,Gao G.R,Jha N.K.eds..Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2004).Lectures Notes in Computer Science 3207.Berlin:Springer-Verlag,2004,879~890

共引文献210

同被引文献2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部