期刊文献+

对ARAP认证协议的攻击及其改进 被引量:3

An Analysis and Improvement of ARAP Authentication Protocol
原文传递
导出
摘要 分析了射频识别(RFID)系统中匿名RFID认证协议(ARAP)存在的安全缺陷,指出攻击者可利用该协议存在的异或运算使用不当的安全缺陷发起身份假冒攻击.为此,提出了一种改进的RFID双向认证协议,该协议修改了ARAP认证协议中部分异或运算和验证操作,仍采用假名机制提供隐私性保护,防止攻击者对标签进行跟踪.结果分析表明,改进后的协议具有双向认证、前向安全性和匿名性等安全属性,并能够抵抗冒充、跟踪和重放等攻击.同时,性能对比分析表明改进后的协议具有比较好的效率,实用性较强. A radio frequency identification (RFID) authentication protocol anonymous RFID authentication protocol (ARAP) protocol is analyzed. It is proved that ARAP protocol is vulnerable to impersonating attacks. An im proved RFID mutual authentication protocol is proposed in this paper. Security analysis shows that the improved protocol can achieve mutual and anonymous authentication. The improved protocol is also resistant to impersonating attacks, tracking attacks and replay attacks. Moreover, comparing with other protocols, the improved protocol is more efficient.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2012年第6期526-530,共5页 Journal of Wuhan University:Natural Science Edition
基金 河南省基础与前沿技术研究计划项目(122300410123) 郑州市科技攻关项目(10PTGG340-4)资助
关键词 射频识别 安全协议 身份认证 HASH函数 radio frequency identification (RFID) cryptographic protocol authentication Hash function
  • 相关文献

参考文献10

  • 1马昌社.前向隐私安全的低成本RFID认证协议[J].计算机学报,2011,34(8):1387-1398. 被引量:66
  • 2刘明生,王艳,赵新生.基于Hash函数的RFID安全认证协议的研究[J].传感技术学报,2011,24(9):1317-1321. 被引量:17
  • 3周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 4张忠,徐秋亮.物联网环境下UC安全的组证明RFID协议[J].计算机学报,2011,34(7):1188-1194. 被引量:23
  • 5Sarma S E,Weis S A,Engels D W. RFID systems and security and privacy implications[C]//Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, New York:Springer-Verlag, 2002 : 454-469.
  • 6Weis S A,Sarma S E,Rivest R L,et al. Security and privacy aspects of low-cost radio frequency identification systems[J]. Security in Pervasive Computing, 2004,28(2) :201-212.
  • 7Ohkubo M, Suzuki K, Kinoshita S. Hash-chain based forward secure privacy protection scheme for low-cost RFID[C]//Proceedings of the 2004 Symposium on Cryptography and Information Security, Berlin: Springer-Verlag, 2004 : 719-724.
  • 8Shen J, Choi D, Moh S, et al. A novel anonymous RFID authentication protocol providing strong privacy and security[C]//Proceedings of 2010 International Conference on Multimedia Information Networking and Security, Nanjing: ACM Press, 2010 : 584-588.
  • 9Niu Ben, Li Hui, Zhu Xiaoyan, et al. Security analysis of some recent authentication protocols for RFID[C]//Proceedings of 2011 Seventh International Conference on Computational Intelligence and Security, Sanya: IEEE Press, 2011 : 665-669.
  • 10卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752. 被引量:117

二级参考文献100

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:99
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 3卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 4Feldhofer M. Comparison of low-power implementations of Trivium and Grain//Proceedings of the Workshop on the State of the Art of Stream Ciphers (SASC 2007). Bochum, Germany, 2007:236-246.
  • 5Feldhofer M, Wolkerstorfer J. Strong crypto for RFID tags--A comparison of low-power hardware implementations//Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 2007). New Orleans, USA, 2007, 27-30.
  • 6Haitner I, Reingold O, Vadhan S. Efficiency improvements in constructing pseudorandom generator from any one-way function//Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC 2010). Cambridge, USA, 2010: 437-446.
  • 7Juels A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394.
  • 8Juels A, Pappu R, Parno B. Unidirectional key distribution across time and space with applications to RFID security// Proceedings of the 17th USENIX Security Symposium. San Jose, Canada, 2008:75-90.
  • 9Molnar D, Wagner D. Privacy and security in library RFID.. Issues, practices, and arehitectures//Proceedings of the Conference on Computer and Communications Security (ACM CCS'04). Washington, USA, 2004:210-219.
  • 10Li Y, Ding X. Protecting RFID communications in supply chains//Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS' 07). Singapore, Singapore, 2007: 234-241.

共引文献395

同被引文献23

  • 1王张宜,李波,张焕国.Hash函数的安全性研究[J].计算机工程与应用,2005,41(12):18-19. 被引量:26
  • 2SARMA S E, WEIS S A,ENGELS D W. RFID systems and security and privacy implications[ C]//Proceedings of the 4th In-ternational Workshop on Cryptographic Hardware and Embedded Systems. New York: Springer-Verlag, 2002 : 454-469.
  • 3WEIS S A, SARMA S E, RIVEST R L, et al. Security and privacy aspects of low-cost radio frequency identification sys-tems[ J]. Security in Pervasive Computing, 2004, 28(2) :201-212.
  • 4OHKUBO M,SUZUKI K, KINOSHITA S. Hash-chain based forward-secure privacy protection scheme for low-cost RFID[C]//Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004). Berlin: Springec Verlag,2004:719-724.
  • 5SHEN J, CHOI D, MOH S, et al. A novel anonymous RFID authentication protocol providing strong privacy and security[C ]//Proceedings 2010 International Conference on Multimedia Information Networking and Security. Nanjing: AcnPress, 2010: 584-588.
  • 6RHEE K, KWAK J, KIM S,et al. Challenge-response based RFID authentication protocol for distributed database envi-ronment [C ] //Proceedings of the 2nd International Conference on Security in Pervasive Computing ( SPC 2005 ) . LecturesNotes in Computer Science 3450. Berlin : Springer-Verlag, 2005 : 70-84.
  • 7BURRROWS M,ABADI M, NEEDHAM R. A logic of authentication [ J]. ACM Transactions on Computer Systems,1990,8(1) :18-36.
  • 8WANG D,MA C G,GU D L, et al. Cryptanalysis of two dynamic ID-Based remote user authentication schemes for multi-server architecture [ J]. Lecture Notes in Computer Science, 2012,7645:462*475.
  • 9SARMA S E, WEIS S A, ENGELS D W RFID systems and security and privacy impficatJons[C].llProceedings of the 4th international Workshop on CryptographJc Hardware and Embedded Systems, New York: Springer-Verlag, 2002:454-469.
  • 10WEIS S A, SARMA S E, RIVEST R L, et aL Security and privacy aspecls of ow-cost radio frequency identification systems[J]. Security in Pervasive Computing, 2004, 28(2):201-212.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部