期刊文献+

开放式RFID双向认证协议及安全性分析 被引量:6

Research and security analysis on open RFID mutual authentication protocol
下载PDF
导出
摘要 针对射频识别(RFID)系统由于资源有限、广播传输等因素而存在的安全缺陷,提出了一种在开放环境中标签和阅读器之间进行双向认证的协议。采用对称加密结合随机数的方法可以很好地协调安全、高效以及成本问题。同时协议不要求阅读器与数据库之间的通信必须是安全的,从而提高了阅读器的移动性和应用范围。通过BAN逻辑对协议进行了形式化分析,证明了所提协议是安全可达的,能够有效避免窃听、追踪和重放等安全威胁。 Considering that Radio Frequency Identification (RFID) system has many security problems because of limited resource and broadcasting transmission, a new improved mutual authentication protocol was put forward. In the protocol, symmetric eneryption combined with the random number method was used. It has advantage in balancing the security, efficiency and cost. The protocol can be applied in an open environment which the transmission security between database and reader is not requested necessary. It can improve the mobility and the application range of the reader. BAN logic was used to do the formal analysis and proved that the proposed protocol is safe and reachable. The proposed protocol can effectively solve the security attacks, such as eavesdropping, tracing and replaying.
作者 张楠 张建华
出处 《计算机应用》 CSCD 北大核心 2013年第1期131-134,共4页 journal of Computer Applications
基金 国家社会科学基金资助项目(12BTQ056) 四川省应用基础研究项目(2012JY0096) 西南民族大学中央高校基本科研业务专项(11NZYTH06)
关键词 射频识别 标签 阅读器 认证 BAN逻辑 Radio Frequency Identification (RFID) tag reader authentication BAN logic
  • 相关文献

参考文献17

  • 1SARMA S E, WEISS A, ENGELS D W, RFID systems and securi- ty and privacy implications [ C]// Proceedings of the 4th Interna- tional Workshop on Cryptographic Hardware and Embedded Sys- tems. Berlin: Springer, 2002:454-469.
  • 2WEISS A, SARMA S E, RIVEST R L, et al. Security and privacy aspects of low-cost radio frequency identification systems [ C]//Pro- ceedings of the First International Conference Security in Pervasive Computing. Berlin: Springer, 2003:201-212.
  • 3OHKUBO M, SUZUKI K, KINOSHITA S. Cryptographie approach to "privacy-friendly" tags [ EB/OL]. [ 2012-03-22]. http://www. rfidDrivacv, org./DaDers/ohkubo, ndf.
  • 4丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592. 被引量:93
  • 5KARTHIKEYAN S, NESTERENKO M. RFID security without ex- tensive cryptography [ C]// Proceedings of the 3rd ACM workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2005:63 - 67.
  • 6张帆,孙璇,马建峰,曹春杰,朱建明.供应链环境下通用可组合安全的RFID通信协议[J].计算机学报,2008,31(10):1754-1767. 被引量:30
  • 7BURMESTER M, van LE T, de MEDEIROS B. Provably secure u- biquitous systems: universally composable RFID authentication pro- tocols [ C]// Proceedings of the 2nd IEEE/CreateNet International Conference on Security and Privacy in Communication Networks.Washington, DC: IEEE Computer Society, 2006: 176-186.
  • 8van LE T, BURMENTER M, de MEDEIROS B. Universally com- posable and forward-secure RFID authentication and authenticated key exchange [ C]//Proceedings of the 2nd ACM Symposium on In- fownation, Computer and Communications Security. New York: ACM Press, 2007:242-252.
  • 9邓淼磊,马建峰,周利华.RFID匿名认证协议的设计[J].通信学报,2009,30(7):20-26. 被引量:22
  • 10CHEN Y L, CHOU J S, SUN H M. A novel mutual authentication scheme based on quadratic residues for RFID systems [ J]. Com- puter Networks, 2008, 52(12): 2373-2380.

二级参考文献112

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2Finkenzeller K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons, 2003.
  • 3Sarma S E, Weis S A, and Engels D W. RFID systems and security and privacy implications. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHES 2002). Lectures Notes in Computer Science 2523. Berlin: Springer-Verlag, 2003: 454-469.
  • 4Sarma S E, Weis S A, and Engels D W. Pmdio frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes, 2003, 6(1): 2-9.
  • 5Ohkubo M, Suzuki K, and Kinoshita S. Hash-chain based forward secure privacy protection scheme for low-cost RFID. Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai, 2004: 719-724.
  • 6Rhee K, Kwak J, and Kim S. Challenge-response based RFID authentication protocol for distributed database environment Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005). Lectures Notes in Computer Science 3450. Berlin: Springer-Verlag, 2005: 70-84.
  • 7Hun WookKim and Shu YunLim. Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security. 2006 International Conference on Hybrid Information Technology (ICHIT~06), Ichit, 2006.11, Vol. 2: 718-723.
  • 8Henrici D and Muller P. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Percomv, 2004: 149-153.
  • 9Zhang Lan and Zhou Huaibei. An improved approach to security and privacy of RFID application system. Proceedings of 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005, Vol2: 1195-1198.
  • 10International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004

共引文献155

同被引文献41

  • 1王宏霞,何晨,丁科.基于混沌映射的鲁棒性公开水印[J].软件学报,2004,15(8):1245-1251. 被引量:50
  • 2肖方红,阎桂荣,韩宇航.混沌时序相空间重构参数确定的信息论方法[J].物理学报,2005,54(2):550-556. 被引量:45
  • 3洪利,杜耀宗.基于ECC的密钥协商及双向认证方案[J].计算机工程与设计,2007,28(13):3076-3077. 被引量:7
  • 4张楠,张建华,陈建英,谈文蓉,赵国.无线传感器网络中基于混沌的密钥预分配方案[J].计算机应用,2007,27(8):1901-1903. 被引量:4
  • 5SARMA S E,WEIS S A, ENGELS D W. RFID systems and securityand privacy implications [ C] // Proceedings of the 4th InternationalWorkshop on Cryptographic Hardware and Embedded Systems. Ber-lin: Springer, 2002:454 -469.
  • 6OHKUBO M,SUZUKI K,KINOSHITA S. Cryptographic approachto ** privacy-friendlytags [ EB/OL]. [2012 - 12 - 20]. http: //www. rfidprivacy. org/papers/ohkubo. pdf.
  • 7LEE S. Mutual authentication of RFID system using synchronizedsecret information [ D]. Cambridge, MA: MIT, 2003:13 -20.
  • 8RHEE K,KWAKJ, KIM S. Challenge-response based RFID au-thentication protocol for distributed database environment [ C]//Proceedings of the 2nd International Conference on Security in Per-vasive Computing. Berlin: Springer, 2005:70 -84.
  • 9LEMSTKA A K, l.NSTRA H W. Factoring polynomials with rationalcoefficients [J]. Mathematische Annalen, 1982,261(4):513 — 534.
  • 10WEIS S A,SARMA S E. Security and privacy aspects of low-costradio frequency identification systems [ C]// Proceedings of the FirstInternational Conference Security in Pervasive Computing. Berlin:Springer, 2003:201 -212.

引证文献6

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部