期刊文献+

基于Hash链的RFID改进协议 被引量:3

An Improved RFID Authentication Protocol Based on Hash-Chain
原文传递
导出
摘要 由于RFID技术的特殊性和局限性带来了很多安全问题,针对这些安全问题,本文提出了一种Hash链的改进认证协议,以解决假冒攻击、重传攻击、跟踪、前向安全性等安全问题,并基于BAN逻辑给出了形式化的分析,说明改进的协议在BAN逻辑分析下是安全的。由于在RFID标签中仅使用了Hash函数,因此改进的协议更适合于低成本的RFID系统。 Due to the limitation and particularity of RFID technology,a lot of security issues had been brought.Aimed at these security problems,an improved RFID authentication protocol based on Hash-chain has been proposed,in order to solve fake attack,attack,tracking and prior security.The improved protocol is analyzed by BAN logic,and which declares securely under the analysis of BAN logic.Because of the use of Hash function only of RFID tag,the improved protocol is more suitable for low cost RFID system.
作者 马巧梅
出处 《网络安全技术与应用》 2012年第7期62-64,20,共4页 Network Security Technology & Application
基金 宝鸡文理学院重点项目 项目编号:ZK11177资助
关键词 认证协议 HASH链 形式化分析 BAN逻辑 authentication protocol Hash-Chain the formal analysis BAN logic
  • 相关文献

参考文献7

  • 1Ohkubo M. , Suzuki K. , Kinoshita S.. Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai.2004.
  • 2丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592. 被引量:93
  • 3李振汕.RFID系统安全问题研究[J].网络安全技术与应用,2011(5):61-63. 被引量:3
  • 4Ohkubo M, Suzuki K, Kinoshita S.Cryptographic approach to"Privacy-Friendly" tags [OL].[2007-10-07] http://ww, rfidprivacy. us//2003//papers//ohkubo. Pdf.
  • 5周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 6Rhee K, Kwak J, Kim S,et al.Challenge-response based RFID authentication protocol for distributed database environment [C]//Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin : Springer, 2005.
  • 7YAuksel K. Universal hashing for ultra-low-power cryptographic hardware applications [D].Worcester, MA: Depar~ent of Electronical Engineering, Worcester Polytechnic Institute.2004.

二级参考文献67

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170

共引文献269

同被引文献27

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2王俊宇,闵昊.面向物流的RFID应用系统研究[J].计算机工程与应用,2007,43(13):22-25. 被引量:32
  • 3JUELS A. RFID security and privacy: A research survey[ J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) : 381 - 394.
  • 4SARMA S E, WEI S A, ENGELS D W. Radio frequency identifica- tion: Secure risks and challenges [ J]. RSA Laboratories Crypto bytes, 2003, 6(1):2-9.
  • 5WEI S A, SARMA S E, RIVEST R L, et al. Security and privacy aspects of low-cost radio frequency identification systems [ C]//Se- curity in Pervasive Computing, LNCS 2802. Heidelberg: Springer Berlin, 2004:201 -212.
  • 6OHKUBO M, SUZUKI K, KINOSHITA S. Hash-chain based forward- secure privacy protection scheme for low-cost RFID [ C]//Proceed- ings of the 2004 Symposium on Cryptography and Information Securi- ty. Berlin: Springer-Verlag, 2004:719-724.
  • 7ZHANG Y, GUO H. An improved RFID privacy protection scheme based on Hash-chain [ C]// Proceedings of the 2010 International Conference on Logistics Engineering and Intelligent Transportation Systems. New York: IEEE Press, 2010:1 -4.
  • 8DIMITRIOU T. A lightweight RFID protocol to protect against traceability and cloning attacks [ C ]// Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks. Washington, DC: IEEE Computer Society, 2005:59 -66.
  • 9李章林,卢桂章,辛运帏.基于Hash链的可扩展RFID验证协议[J].计算机工程,2008,34(4):173-175. 被引量:7
  • 10张恒山,管会生,韩海强.RFID系统中基于公钥加密的相互认证协议[J].计算机工程与应用,2010,46(5):69-72. 被引量:15

引证文献3

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部