期刊文献+

无线射频识别双向认证协议及性能分析

RFID Mutual Authentication Protocol and Performance Analysis
下载PDF
导出
摘要 针对姚华桢等人提出的射频识别认证协议易遭受读写器ID揭露,中间人攻击和假冒攻击等安全脆弱性,提出一种基于NTRU公钥密码算法的改进双向认证协议,并用GNY逻辑进行了形式化分析。协议不仅具有一次一密的特点,而且在实现双向认证的同时也完成了会话密钥的交换,并将主要的计算放在读写器上,有效降低了服务器的压力;解决了当前协议中存在的位置跟踪,前向安全性等隐私泄漏问题。分析结果表明,该协议不仅能够可抵抗重传,假冒,拒绝服务等多种恶意攻击,而且具有计算复杂度低,通信量小,效率高等特点,适合在低成本标签实现。 As for so many security vulnerabilities, such as readers' ID-disclosure attack, man-in-the-middle attack, spoofing attack in Yao's authentication protocol, we propose a Radio Frequency Identification mutual authentication protocol based on NTRU public key encryption system, and perform formal analysis with GNY logic. The protocol not only has character of once a secret, but also the session key exchanged when mutual authentication protocol com- pleted. Main computing tasks is implemented on the readers, so the pressure of server can be reduced effectively, the position tracking and forward security issues exist in current protocols can be solved as well. Analytic result shows that the proposed mutual authentication protocol can resist replay attack, counterfeit attack, denial of service attacks and other malicious attacks, and has features of low computational complexity, little communication, high efficiency. It is suitable for apply this protocol in low-cost tags.
出处 《成都信息工程学院学报》 2013年第6期590-597,共8页 Journal of Chengdu University of Information Technology
基金 国家自然科学基金资助项目(60873216) 四川省教育厅重点资助项目(12ZA223) 四川省科技支撑计划重点资助项目(2012GZ0017)
关键词 计算机应用技术 信息安全 射频识别 认证协议 NTRU算法 GNY逻辑 technology of computer application information security radio frequency identification authentication protocol number theory research unit algorithm GNY logic
  • 相关文献

参考文献16

二级参考文献85

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Yao Jun Zeng Guihua.Enhanced NTRU cryptosystem eliminating decryption failures[J].Journal of Systems Engineering and Electronics,2006,17(4):890-895. 被引量:3
  • 3KAPS J P. Cryptography for ultra-low power devices [D]. USA : Worcester Polytechnic Institute, 2006.
  • 4KAPS J P, SUNAR B. Energy comparison of AES and SHA-1 for ubiquitous computing [C]//IFIP Int Conf on Embedded and Ubiquitous Computing. Springer, Berlin,2006: 372-381.
  • 5GAUBATZ G ,KAPS J P,OZTURK E,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks [ C ]// Proc of the Third IEEE Int Conf on Pervasive Computing and Communications Workshops. Washington, DC, USA ,2005: 146-150.
  • 6ATICI A C, BATINA L, FAN J F, et al. Low-cost implementations of NTRU for pervasive security [C] // 19th IEEE Int Conf on Application-Specific Systems, Architectures and Processors. Leuven, 2008: 79-84.
  • 7Synopsys, Inc. Power compiler user guide [ K]. Release X- 2005.09.
  • 8EPCglobal tag data standards version 1.3 [ S ]. http:// www. epcglobalinc, org.
  • 9SARMA S E, WEISS A, ENGELS D W. Radio-frequency identification : secure risks and challenges [ J ]. RSA Laboratories Cryptophytes, 2003, 6 ( 1 ) : 2 - 9.
  • 10RHEE K, KWAK J, KIM S. Challenge-response based RFID authentication protocol for distributed database environment [ J ]. Lectures Notes in Computer Science 3450, Berlin : Springer-Verlag, 2005 : 78 - 84.

共引文献254

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部