期刊文献+

满足后向隐私的可扩展RFID双向认证方案 被引量:31

Scalable RFID Mutual Authentication Protocol with Backward Privacy
下载PDF
导出
摘要 无线射频识别(RFID)系统的匿名认证机制可以有效地保护标签的隐私性,而可扩展性和后向隐私安全性是实际应用中需要考虑的两个重要问题.对最近新提出的3个可扩展RFID双向认证协议的安全性进行了分析.分析指出,ACP方案并不能提供后向隐私安全性;G-I方案不能抵抗去同步攻击,攻击者可以通过主动攻击,使得标签和阅读器内存储的密钥数据不一致,从而破坏标签和阅读器的后继认证;而MMR方案不能抵御主动攻击,攻击者可以仿冒合法阅读器,通过不断质询标签并分析标签的回复消息,就可完全推导出标签中存储的全部秘密.在此基础上,提出了一个基于Hash函数的可扩展双向认证方案,方案从存储需求和运算量上要优于G-I方案;并且证明了方案能够满足受限后向隐私安全,并可以抵御去同步攻击. Anonymous authentication mechanisms can be used in RFID systems to preserve the privacy of the RFID tags. Scalability problem and backward privacy problem are two important issues considered in practice. In this paper, security analysis is presented on three recently proposed RFID authentication protocols satisfying scalability and backward privacy. The research shows that ACP protocol can not provide the property of backward privacy; the G-I protocol can not resist dysynchronization attack, i.e. the adversary can make the secrets stored in tag and reader unmatched, which results in the tag and the reader in a desynehronized state and renders future authentication impossible; and the MMR protocol can not resist active attack, because the adversary can extract tag's all secrets via querying the tag and analyzing the messages sent by the tag. In addition, we present a modified sealable hash-based mutual authentication protocol with less storage and computation requirements than G-I. And we prove our scheme can provide the property of backward privacy and resist the desynchronization attack.
出处 《计算机研究与发展》 EI CSCD 北大核心 2013年第6期1276-1284,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60903181) 江苏省科技支撑计划基金项目(61003236) 南京邮电大学校基金项目(NY211064)
关键词 无线射频识别 双向认证 后向隐私性 可扩展性 安全分析 radio frequency identification mutual authentication backward privacy scalability security analysis
  • 相关文献

参考文献2

二级参考文献68

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170

共引文献146

同被引文献125

引证文献31

二级引证文献149

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部