期刊文献+

基于变形Rabin算法的RFID安全协议

RFID Security Protocol Based on Deformation Rabin Algorithm
下载PDF
导出
摘要 运用CRC校验和变形的Rabin算法,提出一种基于变形Rabin算法的无线射频识别双向认证安全协议。该协议能够防止位置隐私攻击、重传攻击、窃听攻击和去同步化攻击,且由于减少搜索后端数据库的次数,避免复杂的Hash计算,具有较高的协议效率。性能分析表明,该协议硬件复杂度相对较低,适用于低成本的标签。 This paper uses Cyclic Redundancy Check(CRC) check and deformation Rabin algorithm, proposes a Radio Frequency Identification (RFID) mutual authentication security protocol based on deformation Rabin algorithm. The protocol can prevent on location privacy attack, retransmission attack, eavesdropping attacks and dis-synchronization attack. By reducing the count of searching back-end database and avoiding the complex Hash calculation, it has high efficiency. Performance analysis shows that its hardware complexity is relatively low, applicable to low cost tag.
出处 《计算机工程》 CAS CSCD 2012年第16期145-148,共4页 Computer Engineering
关键词 无线射频识别 认证协议 Rabin算法 HASH函数 循环冗余校验 Radio Frequency Identification(RFID) authentication protocol Rabin algorithm Hash function Cyclic Redundancy Check(CRC)
  • 相关文献

参考文献8

  • 1Juels A. RFID Security and Privacy: A Research Survey[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381- 394.
  • 2Feldhofer M. An Authentication Protocol in a Security Layer for RFID Smart Tags[C]//Proc. of IEEE MELECON'04. [S. 1 .]: IEEE Press, 2004: 759-762.
  • 3Dimitriou T. A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks[C]//Proc. of the 1st Intemational Conference on Security and Privacy for Emerging Areas in Communications Networks. Athens, Greece: [s. n.], 2005: 59-66.
  • 4Duc D C, Park J, Lee H, et al. Enhancing Security of EPC Global Gen2 RFID Tag Against Traceability and Cloning[C]//Proc. of 2006 Symposium on Cryptography and Information Security. Hiroshima, Japan: [s. n.], 2006: 269-277.
  • 5Chien H Y, Chen C H. Mutual Authentication Protocol for RFID Conforming to EPC Classl Generation2 Standards[J]. Computer Standards & Interfaces, 2006, 26(2): 254-259.
  • 6Li Yongzhen, Su Jeong Yoon, Sun Ning. Low-cost Authentication Protocol of the RFID System Using Partial ID[C]//Proc. of 2006 International Conference on Computational Intelligence and Security. Guangzhou, China: [s. n.], 2006: 1221- 1224.
  • 7张辉,侯朝焕,王东辉.一种基于部分ID的新型RFID安全隐私相互认证协议[J].电子与信息学报,2009,31(4):853-856. 被引量:18
  • 8Shamir A. SQUASH- A New MAC with Provable Security Properties for Highly Constrained Devices such as RFID Tags[C]// Proc. ofFSE'08. [S. 1.]: Springer-Verlag, 2008.

二级参考文献11

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2蔡庆玲,詹宜巨,史斌宁.一种符合EPC C1G2标准的RFID随机化密钥双向认证协议[J].电信科学,2007,23(4):70-74. 被引量:4
  • 3Klaus F. RFID Handbook: Radio-Frequency Identification Fundamentals and Applications in Contactless Smart Cards and Identification[M]. Second Edition, West Sussex, England John Wiley & Sons Ltd, 2003: 341-393.
  • 4广东电子工业研究院.RFID研究动态.http://www.gdeii.com.cn/Technique/Technique?_content.jsp?id=38,2005.
  • 5Garfinkel S L, Juels A, and Pappu R. RFID privacy: An overview of problems and proposed solutions[J]. IEEE Security & Privacy Magazine, 2005, 3(3): 34-44.
  • 6Juels A. RFID security and privacy: A research survey[J]. IEEE Journal on Selected Areas in Communications, 2004, 24(2): 381-394.
  • 7Dimitriou T. A lightweight RFID protocol to protect against traceability and cloning attacks[C]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Athens, Greece, September 2005: 59-66.
  • 8Duc D C, Park J, Lee H, and Kim K. Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning[C]. The 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 17-20, 2006 269-277.
  • 9Chien H Y and Chen C H. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards[J]. Computer Standards & Interfaces, 2006, 26(2): 254-259.
  • 10Li Yong-Zhen, Jeong Yoon-Su, Sun Ning, and Lee Sang-Ho. Low-cost authentication protocol of the RFID system using partial ID[C]. Proceedings of 2006 International Conference on Computational Intelligence and Security. Guangzhou, China, November 3-6, 2006, 2: 1221-1224.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部