期刊文献+

改进型RFID相互认证协议研究 被引量:2

An Improved RFID Mutual Authentication Protocol
下载PDF
导出
摘要 随着射频识别(RFID)技术的发展和广泛应用,RFID系统的安全性成为了研究的热点,但是由于标签有限的计算能力和存储能力,安全协议的设计成为了保证RFID系统安全的关键。文章对SYK协议的安全性进行了分析,针对其存在的多个安全漏洞进行改进,提出了一种改进型的RFID相互认证协议。安全性能分析表明,改进后的协议通过标签和数据库的信息同步更新和散列函数加密,解决了SYK协议的安全隐私问题,满足基本的安全性能,可以抵制跟踪、去同步、重传等多种攻击,提高了RFID系统的安全性。 With the radio frequency identification (RFID) technology developed and widely used, the safety of the RFID system becomes the focus of research, but the design of security protocols becomes the key to ensure the safety of RFID system because of the limited computing and storage capacity of the tag. In this paper, analyzing the safety performance and improving the security multi-vulnerabilities existed in the SYK protocol, an improved RFID mutual authentication protocol is proposed. Safety performance analysis shows that the proposed protocol solves the privacy problem of the SYK protocol through the synchronous updating of the information and hash function of encryption,meeting the basic satety requirements and overcoming various attacks, such as a-acking de-synchronization and replay at- tack. The security of the RFID system is strengthened.
出处 《计算机技术与发展》 2013年第8期129-132,144,共5页 Computer Technology and Development
基金 国家自然科学基金资助项目(60973140 61001077 61170276) 南京邮电大学自然科学基金项目(NY211076)
关键词 射频识别技术 相互认证协议 散列函数 安全 radio frequency identification mutual authentication protocol hash function security
  • 相关文献

参考文献14

二级参考文献78

共引文献108

同被引文献28

  • 1Juels A. "yoking-proofs" for RFID tags [ C ]//Proc of second IEEE annual conference on pervasive computing and commu- nication workshops. [ s. 1. ] : IEEE,2004 : 138-143.
  • 2Cho J S, Yeo S S, Hwang S, et al. Enhanced yoking proof pro- tocols for RFID tags and tag groups [ C ]//Proc of 22nd inter- national conference on advanced information networking and applications. Okinawa : IEEE ,2008 : 1591 - 1596.
  • 3Leng Xuefei, Lien Y H, Mayes K, et al. Select- response grouping proof for RFID tags [ C ]//Proc of first Asian confer-ence on intelligent information and database systems. Dong hoi : IEEE Computer Society ,2009:73-77.
  • 4Piao Chunhui, Fan Zhenjiang, Yang Chunyan, et al. Research on RFID security protocol based on grouped tags and re-en- cryption scheme[ C]//Proc of IEEE international conference on wireless communications, networking and information secur- ity. Beijing : IEEE ,2010:568-572.
  • 5Rahman M S, Soshi M, Miyaji A. A secure RFID authentica- tion protocol with low communication cost [ C ]//Proc of IEEE international conference on complex, intelligent and software intensive systems. Fukuoka : IEEE ,2009:559-564.
  • 6Chien H Y. SASI : a new ultralight-weight RFID authentication protocol providing strong authentication and strong integrity [ J]. IEEE Transactions on Dependable and Secure Compu- !ing,2007,4(4) :337-340.
  • 7Cho C H, Do K H, Kim J W, et al. Design of RFID mutual au- thentication protocol using time stamp [ C ]//Proc of 2009 fourth international conference on computer sciences and con- vergence information technology. [ s. 1. ] : [ s. n. ] ,2009 : 1047 -1051.
  • 8Safkhani M, Bagheri N, Naderi M, et al. Security analysis of LMAP++,an RFID authentication protocol[ C]//Proc of in- ternational conference on internet technology and secured transactions. Abu Dhabi : IEEE ,2011:689-694.
  • 9ARBIT A,OREN Y,WOOL A.Toward practical public key anti-counterfeiting for low-cost EPC tags[C]//2011 IEEE International Conference on RFID,April 12-14,2011,Orlando,FL,USA.New Jersey:IEEE Press,2011:184-191.
  • 10GODOR G,IMRE S.Elliptic curve cryptography based authentication protocol for low-cost RFID tags[C]//2011 IEEE International Conference on RFID-Technologies and Applications(RFID-TA),Sept 15-16,2011,Sitges,Spain.New Jersey:IEEE Press,2011:386-393.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部