期刊文献+

基于射频指纹的高安全强度RFID认证协议 被引量:3

Security enhanced RFID authentication protocol based on RF fingerprint
下载PDF
导出
摘要 在分析现有基于(EPC Class 1Gen,2EPCGen2)标准的轻量级RFID相互认证协议的基础上,提出了一种符合EPCGen2标准的基于射频指纹的RFID认证协议。协议融合了RFID设备的物理层信息,实现了RFID标签的跨层融合认证,具有增强RFID系统安全强度的特点。分析显示,提出协议具有相互认证、私密性、防止重放攻击、防止去同步攻击等安全性能,尤其能有效对抗RFID标签的克隆攻击。 With the analysis of the current lightweight RFID mutual authentication protocols based on EPCGEN-2 standard, a novel RFID authentication protocol based on RF fingerprint is proposed, which corresponds with EPCGEN-2 standard. The proposed protocol combines the physical layer information of RFID equipment, implements the cross-layer fusion authentication of RFID tags, and has the characteristics of enhancing security density of RFID system. The result of analysis demonstrates that the proposed protocol has the security properties such as mutual authentication, privacy, preventing replay attack and the desyn- chronization attack, especially effectively resisting tag cloning attack.
作者 严燕 袁红林
出处 《计算机工程与设计》 CSCD 北大核心 2013年第11期3736-3739,3761,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(61071086) 中国交通运输部科技基金项目(2010-353-332-110/2012-319-813-270)
关键词 射频识别 认证协议 射频指纹 物理层认证 标签克隆 radio frequency identification (RFID) authentication protocol RF fingerprint physical layer authentication tag cloning
  • 相关文献

参考文献16

  • 1Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags [C] //Proceedings of International Confe- rence on Ubiquitous Intelligence and Computing. Berlin: Springer-Verlag, 2006: 912-923.
  • 2Barasz M. Passive attack against the M2AP mutual authentica- tion protocol for RFID tags [C] //Proc First Int'l Workshop RFID Technology (EURASIP), 2007.
  • 3Li Tieyan, Deng Robert. Vulnerability analysis of EMAP- An efficient RFID mutual authentication protocol [C] //Proceedings of the 2nd International Conference on Availability, Relia- bility and Security. Washington, DC: IEEE Computer Society, 2007: 238-245.
  • 4张学军,蔡文琦,王玉.增强型RFID极低限相互认证协议[J].计算机应用,2012,32(9):2395-2399. 被引量:1
  • 5Chien HY. SASI: A new ultra lightweight rfid authentication protocol providing strong authentication and strong integrity [J]. IEEE Trans on Dependable and Secure Computing, 2007, 4 (4): 337-340.
  • 6Sun H M, Ting W C, Wang K H. On the security of chien's ultralightweight RFID authentication protocol [J]. IEEE Trans on Dependable and Secure Computing, 2011, 8 (2): 315-317.
  • 7Tian Yun, Chen Gongliang, Li Jianhua. A new ultralight- weight RFID authentication protocol with permutation [J]. IEEE Communications Letters, 2012, 16 (5): 702-205.
  • 8Yuan H L, Hu A Q. Preamble-based detection of Wi-Fi trans- mitter RF fingerprints [J]. Electronics Letters, 2010, 46 (16):1165-1167.
  • 9袁红林.射频指纹识别系统的数学模型研究[J].通信技术,2009,42(6):113-114. 被引量:4
  • 10Zeng K, Govindan K, Mohapatra P. Non-cryptographie authentication and identification in wireless networks [J]. IEEE Wireless Communications, 2010, 17 (5): 56-62.

二级参考文献27

  • 1Ureten Oktay, Serinken Nur. Wireless security through RF fingerprinting[J]. Can. J. Elect. Comput. Eng., 2007, 32(1): 27- 33.
  • 2Ureten O, SerinkenN. Bayesian detection of Wi Fi transmitter RF fingerprints[J]. Electronics Letters, 2005, 41 (6) :373-374.
  • 3Hail J, Barbeau M, Kranakis E. Enhancing Intrusion Detection in Wireless Networks Using Radio Frequency Fingerprinting[C]. Communications, Internet and Information Teehnology(CIIT) . St. Thomas, US Virgin Islands, 2004.103-108.
  • 4Meadows Catherine. Formal Methods for Cryptographic Protocol Analysis:Emerging Issues and Trends[J]. IEEE Journal on Selected Areas In Communications, 2003, 21(1):44-54.
  • 5Tomko A A, Rieser C J, Buell L H. Physical Layer Intrusion Detection in Wireless Networks[C]. Military Communications Conference. Washington, D.C.,USA, 2006.1-7.
  • 6Tekbas O H, Serinken N, Ureten O. An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions[J]. Can. J.Elect. Comput. Eng., 2004,29(3):203-209.
  • 7Ellis K J, Serinken N. Characteristics of radio transmitter fingerprints[J]. Radio science, 2001, 36(4):585-597.
  • 8Toonstra J, Kinsner W. Transient Analysis and Genetic Algorithms for Classification[C]. IEEE WESCANEX'95 Proceedings. Manitoba, Canada, 1995.432-437.
  • 9Mancini Ron. Worst-case circuit design includes component tolerances[EB/OL], http://www. edn. com/, 2008.
  • 10唐章勋,申敏.基于RF的短程无线通信系统设计[J].通信技术,2007,40(8):62-63. 被引量:6

共引文献3

同被引文献27

  • 1ZHANGGexiang,JINWeidong,HULaizhao.Resemblance Coefficient Based Intrapulse Feature Extraction Approach for Radar Emitter Signals[J].Chinese Journal of Electronics,2005,14(2):337-341. 被引量:43
  • 2Want R. Santa Clara. An Introduction to RFID Technology[J]. IEEE Pervasive Computing, 2006, 5(1): 25-33.
  • 3Landt J. The History ofRFID[J]. IEEE Potential, 2005, 24(4): 8-11.
  • 4Weinstein R. RFID: A Ttechnical Overview and Its Application to the Enterprise[J]. IT Professional, 2005, 7(3): 27-33.
  • 5Rebecca Angeles. RFID Technology: Supply-chain Application and Implementation lssues[J]. Information Systems Management, 2005, 22(1):51-65.
  • 6Juels A. RFID Security and Privacy: A Research Survey[J]. 1EEE Selected Areas in Communications, 2006, 24(2): 381-394.
  • 7Sanjay E. Sarma, Stephen A. Weis, Daniel W. Engels. RFID Systems and Security and Privacy Implications[C]// Cryptographic Hardware and embedded Systems(CHES-2002). Redwood city, USA: Springer, 2002: 454-469.
  • 8Hung-Yu Chien. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity[J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4): 337-340.
  • 9MC De Vivo, A Polzonetti, P Tapanelli. RFID Privacy and Security Risks: Italian case study[C]// The 6th International Conference on Advances in Information Technology. Bangkok, Thailand: Springer, 2013: 173-183.
  • 10Singh, Ajay Kant, Dhal, Subhaish, Sengupta, Indranil. An Approach to Solve Tracking and Message Blocking Problems in lI.FID[C]//2014 Fourth International Conference on Communication Systems and Network Technologies. Bhophal, India: IEEE, 2014:1187-1191.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部