期刊文献+

一种基于字合成运算的射频识别双向认证协议 被引量:1

A bidirectional authentication protocol for RFID based on Syn
下载PDF
导出
摘要 RFID系统由标签、读写器、后台数据库3部分组成,其中标签与读写器之间通过无线信道进行信息传输,存在易被攻击者截获通信信息的风险。提出一种基于字合成运算的射频识别双向认证协议。所提协议运用二次剩余定理对信息进行加密,增大破解难度;每轮通信加密过程中,随机数的添加使得前后通信消息均不一致,致使攻击者无法发起追踪攻击行为信消息加密过程中,同时采用字合成运算方法,能够有效减少RFID系统总的计算量;后台数据库端引入随机数校验机制,使系统能够有效抵抗异步攻击等攻击。安全性分析表明,基于字合成运算的射频识别双向认证协议具备较高的安全性;性能分析表明,协议具备轻行为量级计算量的标准。 The RFID system is made up of three parts: tags, readers and databases. The information between tags and readers are transmitted through wireless channel, which is easy to be intercepted by attackers. A two-way authentication protocol based on word Synthesis operation was proposed. The two remainder theorem was used to encrypt communication messages by the proposed protocol, the difficulty of cracking was increased; In the process of each round of communication encryption, a random number was added to make the communication messages inconsistent, so that the tracking attacks could not be initiated by attackers. In the communication message encryption, the word synthesis algorithms was adopted at the same time, the total calculation of the system could be effectively reduced. A random checking mechanism was introduced at the database, enabling a synchronous attack and other attacks to be effectively resisted by the system. Security analysis shows that the protocol has high security, and performance analysis shows that the protocol has the standard of lightweight computation.
作者 占善华 黄少荣 ZHAN Sharthua;HUANG Shaorong(Department of Information Management,Guangdong Justice Police Vocational College,Guangzhou 510006,China;School of Computer Science and TechnoIogy,Guangdong University of Technology,Guangzhou 510006,China)
出处 《电信科学》 2018年第12期65-70,共6页 Telecommunications Science
基金 国家自然科学基金资助项目(No.61672171 No.61772141) 广东省教育厅重大科研项目(No.2016KZDXM052) 广东司法警官职业学院第三届院级课题(No.2017YB007)~~
关键词 射频识别 随机数 字合成运算 二次剩余定理 RFID random number Syn quadratic residual theorem
  • 相关文献

参考文献10

二级参考文献64

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2Miles S B, Sarma S E, Williams J R. RFID Technology and Applications[M]. New York, USA: Cambridge University Press, 2008.
  • 3Weis S, Sarma S, Rivest R, et al. Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems[C] //Proc. of the 1st International Conference on Security in Pervasive Computing. Boppard, Germany: [s. n.] , 2003.
  • 4Chen Yalin, Chou Jue-Sam, Sun Hung-Min. A Novel Mutual- authentication Scheme Based on Quadratic Residues for RFID Systems[J]. Computer Networks, 2008, 52(12): 2373-2380.
  • 5Yeh Tzu-Chang, Wu Chien-Hung, Tseng Yuh-Min. Improvement of the RFID Authentication Scheme Based on Quadratic Residues[J]. Computer Communications, 2011, 34(3): 337-341.
  • 6Forouzan B A. 密码学与网络安全[M]. 马振晗, 贾军保, 译. 北京: 清华大学出版社, 2009.
  • 7Suh G E, Devadas S.Physical Unclonable Functions for Device Authentication and Secret Key Generation[C]//Proc.of the 44th ACM/IEEE Design Automation Conference.New York, USA: ACM Press, 2007.
  • 8Gassend B, Clarke D, Dijk M, et al.Silicon Physical Random Functions[C]//Proc.of the 9th ACM Conference on Computer and Communications Security.New York, USA: [s.n.], 2002.
  • 9Hammouri G, Ozturk E, SunarA B.A Tamper-proof and Lightweight Authentication Scheme[J].Pervasive and Mobile Computing, 2008, 4(6): 807-818.
  • 10Kulseng L, Zhen Yu.Lightweight Mutual Authentication and Ownership Transfer for RFID Systems[C]//Proc.of INFOCOM’10.[S.l.]: IEEE Press, 2010.

共引文献158

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部