期刊文献+

RFID安全协议的数据去同步化攻击 被引量:8

Data desynchronization attacks on RFID security protocols
原文传递
导出
摘要 为了分析无线射频识别(RFID)安全协议的数据去同步化攻击问题,对串空间模型进行了扩展,引入了分析RFID安全协议数据去同步化攻击的能力,并给出了数据去同步化攻击的判定定理.在扩展的串空间模型下,对近年来提出的一个基于哈希函数的RFID安全协议和一个无需后端数据库的RFID认证协议进行了分析,发现了针对这2个RFID安全协议的数据去同步化攻击,该攻击破坏了协议的可用性.分别对这2个RFID安全协议进行改进,改进后的RFID安全协议克服了存在的安全隐患,能够抵御数据去同步化攻击. The primary objective of this paper is analyze data desynchronization attacks on security protocols for radio frequency identification (RFID). Thus, the strand space model was extended so that it can be applied to analyze data desynchronization attacks. The theorem of data desynchroniza- tion attacks was also given. Based on the extended strand space model, a recently proposed RFID se- curity protocol based on a hash and an RFID authentication protocol without the need for a bake-end database were analyzed. The results show that these two protocols are vulnerable to the data desyn- chronization attack and the attack destroyed the availability of the protocols. Furthermore, the im- provements to overcome the security vulnerabilities of these protocols are presented.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2013年第4期65-69,共5页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60803150)
关键词 无线射频识别 安全协议 模型 去同步化攻击 串空间 radio frequency identification security protocol model desynchronization attacksstrand space
  • 相关文献

参考文献15

  • 1闫新庆,尹周平,熊有伦.射频识别的随机模型及参数分析[J].华中科技大学学报(自然科学版),2009,37(1):96-99. 被引量:3
  • 2邓淼磊,马建峰,周利华.RFID匿名认证协议的设计[J].通信学报,2009,30(7):20-26. 被引量:22
  • 3Moessner M,Khan G N.Secure authenticationscheme for passive C1G2 RFID tags[J].ComputerNetworks,2012,56(1):272-286.
  • 4Lee Y C.Two utralightweight authentication proto-cols for low-cost RFID tags[J].Applied Mathematics&Information Sciences,2012,6(2):425-431.
  • 5Fu J,Wu C,Chen X,et al.Scalable pseudo randomRFID private mutual authentication[C]∥2nd IEEEInternational Conference on Computer Engineeringand Technology(ICCET).Chengdu:IEEE Press,2010:497-500.
  • 6Habibi M H,Gardeshi M,Alaghband M.Cryptanal-ysis of two mutual authentication protocol for low-cast RFID[J].International Journal of Distributedand Parallel Systems,2011,2(1):103-114.
  • 7Le T,Burmester M,Medeiros B.Universally com-posable and forward secure RFID authentication andauthenticated key exchange[C]∥2nd ACM Symposi-um on Information,Computer and CommunicationsSecurity.Washington:ACM Press,2007:242-252.
  • 8邓淼磊,黄照鹤,杨录山,周利华.认证协议中数据同步的分析[J].计算机科学,2010,37(3):83-85. 被引量:2
  • 9Vahedi E,Ward R K,Blake F.Security analysis andcomplexity comparison of some recent lightweightRFID protocols[C]∥4th International Conference onComputational Intelligence in Security for InformationSystems.Berlin:Springer Press,2011:92-99.
  • 10Ahmadian Z,Salmasizadeh M,Aref M.Desynchro-nization attack on RAPP ultralightweight authentica-tion protocol[J].Information Proceeing Letters,2013:113(7):205-209.

二级参考文献37

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Want R. Enabling uniquitous sensing with RFID[J]. Computer, 2004, 34(4): 84-86.
  • 3Wu N, Nystrom M, Lin T, et al. Challenges to global RFID adoption[J]. Technovation, 2006, 26(12): 1 317-1 323.
  • 4Viehland D, Wong A. The future of radio frequency identification[J]. Journal of Theoretical and Applied Electronic Commerce Research, 2007, 2(2): 74-81.
  • 5Shih D, Sun P, Yen D, et al. Taxonomy and survey of RFID anti-collision protocols[J]. Computer Communication, 2006, 29(1): 2 150-2 166.
  • 6Feller W. An introduction to probability theory and its applieations[M]. 3rd Edition. New York: Wiley Press, 1970.
  • 7Vogt H. Multiple object identification with passive RFID tags[C]//Proceedings of IEEE International Conference on Systems, Man and Cybernetics. Hammamet: IEEE Press, 2002: 1 854-1 858.
  • 8Cha J, Kim J. Novel anti-collision algorithms for fast object identification in RFID systems[C]//Proceeding of IEEE International Conference on Parallel and Distributed Systems. Fukuoka: IEEE Press, 2005: 63- 67.
  • 9Kodialam M, Nandagoal T. Fast and reliable estimation schemes in RFID Systems[C]// Proceeding of Mobile Computing and Networking. Los Angle: IEEE Computer Society Press, 2006: 322-333.
  • 10Huang X, Dharmendra S. Reliable and fast estima tion for wireless media RFID systems[C]// Proceed ing of 2007 IEEE International Conference on Auto mation and Logistics. Jinan: IEEE Press, 2007 2 676-2 679.

共引文献24

同被引文献59

  • 1高锐.一种基于空间分割的无源RFID室内定位方法[J].计算机应用研究,2012,29(1):185-186.
  • 2Juels A. "yoking-proofs" for RFID tags [ C ]//Proc of second IEEE annual conference on pervasive computing and commu- nication workshops. [ s. 1. ] : IEEE,2004 : 138-143.
  • 3Cho J S, Yeo S S, Hwang S, et al. Enhanced yoking proof pro- tocols for RFID tags and tag groups [ C ]//Proc of 22nd inter- national conference on advanced information networking and applications. Okinawa : IEEE ,2008 : 1591 - 1596.
  • 4Leng Xuefei, Lien Y H, Mayes K, et al. Select- response grouping proof for RFID tags [ C ]//Proc of first Asian confer-ence on intelligent information and database systems. Dong hoi : IEEE Computer Society ,2009:73-77.
  • 5Piao Chunhui, Fan Zhenjiang, Yang Chunyan, et al. Research on RFID security protocol based on grouped tags and re-en- cryption scheme[ C]//Proc of IEEE international conference on wireless communications, networking and information secur- ity. Beijing : IEEE ,2010:568-572.
  • 6Rahman M S, Soshi M, Miyaji A. A secure RFID authentica- tion protocol with low communication cost [ C ]//Proc of IEEE international conference on complex, intelligent and software intensive systems. Fukuoka : IEEE ,2009:559-564.
  • 7Chien H Y. SASI : a new ultralight-weight RFID authentication protocol providing strong authentication and strong integrity [ J]. IEEE Transactions on Dependable and Secure Compu- !ing,2007,4(4) :337-340.
  • 8Cho C H, Do K H, Kim J W, et al. Design of RFID mutual au- thentication protocol using time stamp [ C ]//Proc of 2009 fourth international conference on computer sciences and con- vergence information technology. [ s. 1. ] : [ s. n. ] ,2009 : 1047 -1051.
  • 9Safkhani M, Bagheri N, Naderi M, et al. Security analysis of LMAP++,an RFID authentication protocol[ C]//Proc of in- ternational conference on internet technology and secured transactions. Abu Dhabi : IEEE ,2011:689-694.
  • 10MAHDIN H,ABAWAJY J.An approach for removing redundant data from RFID data streams[J].Sensors, 2011, 11 (10) : 9863 -9877.

引证文献8

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部