期刊文献+

轻量级RFID双向认证协议设计与分析 被引量:14

Design and Analysis of a Lightweight Mutual Authentication Protocol for RFID
下载PDF
导出
摘要 针对低成本RFID系统常用的基于Hash运算认证协议的安全性进行研究,分析了该类协议存在的安全缺陷和不足,给出设计低成本RFID认证协议满足安全需求的思路,提出了一种轻量级的RFID双向认证协议,运用BAN逻辑的形式化分析方法,对该协议的安全性进行证明。结果显示,该认证协议能满足RFID应用中面临的机密性、完整性和可追踪性的安全需求,可抵制跟踪、标签假冒、重放等攻击,弥补已有基于Hash运算的认证协议中存在的安全缺陷,更适合低成本RFID系统对应用安全的需求。 The security of Hash-based operation authentication protocol, which is usually used by the low-cost RFID system, is researched. Based on the analysis of security shortcomings and flows of this protocol, a thesis of low-cost RFID authentication protocol to meet the security requirements is formulized and a light-weight RFID bi-directional authentication protocol is proposed. The security of the proposed protocol is proved by using the formal analysis method of BAN logic. The results show that the proposed protocol can meet the security requirements of confidentiality, integrity, and traceability in RFID applications. Besides, the protocol can resist attacks of tracking, label counterfeit, and replay, improve the security flaws existing in the current Hash-based operation authentication protocol, and better meets the security requirements of the low-cost RFID system.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2013年第3期425-430,共6页 Journal of University of Electronic Science and Technology of China
基金 国家863项目(2008AA04A107)
关键词 认证协议 形式化方法 哈希算法 射频识别 协议的安全性 authentication protocol format method Hash algorithm RFID security of protocol
  • 相关文献

参考文献14

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2JUELS A, R/VEST R, SZYDLO M. The blocker tag: Selective blocking of RFID tags for consumer privacy[C]// Proceeding of the 8th ACM Conference on Computer and Communication Security. New York: ACM, 2003: 103-111.
  • 3PEDRO P L, JUL10 C H C, JUAN M, et al. RFID system: a survey on security threats and proposed solutions[J]. Lecture Notes in Computer Science, 2006, 42(17): 159-170.
  • 4丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592. 被引量:93
  • 5谌绍巍,陈睿,凌力.一种改进的Hash函数RFID双向安全认证协议[J].计算机系统应用,2010,19(3):67-70. 被引量:3
  • 6SARMA S E, WEI S A, ENGLES D W. Radio-frequency identification: Security risks and challenges[J]. CryptoBytes Technical Newsletter from RSA Laboratories, 2003, 6(1): 2-9.
  • 7LEE S M, HWANG Y J, LEED H, et al. Efficient authentication for low cost RFID System[C]//Intemational Conference on Computational science and its Applications. Singapore: Wodd Scientific Publish Company, 2005: 619-627.
  • 8HENRICI D, MAULLER P. Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers[C]//lntemational Workshop on Pervasive Computing and Communication. Orlando, USA: [s.n.], 2004: 149-153.
  • 9SEIS A, SAIMA S E, RIVEST R L. Security and privacy aspects of low-cost radio frequency identification System[C]//Proceeding of the 1st International Conference on Security in Pervasive Computing. [S.l.]: Springer, 2004: 201-212.
  • 10张兵,马新新,秦志光.基于hash运算的RFID认证协议分析和改进[J].计算机应用研究,2011,28(11):4311-4314. 被引量:13

二级参考文献108

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170

共引文献438

同被引文献87

引证文献14

二级引证文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部