期刊文献+

RFID分布式密钥阵列认证协议的安全性分析 被引量:2

Security analysis of key array authentication protocol
下载PDF
导出
摘要 RFID技术已广泛地应用在诸如访问控制、支付系统、票务系统以及供应链管理等领域,但同时安全和隐私问题变得越来越严重。安全认证协议的设计与完善对于保护信息安全和用户隐私变得更加重要。2011年H.Ning等人提出分布式可扩展密钥阵列认证协议(KAAP),该协议采用分布式密钥阵列架构、访问列表机制和动态随机数机制来抵御系统外部攻击和内部假冒攻击。针对KAAP建立两种有效的攻击模型,在此基础上分析得出该认证协议不能有效地抵御来自外部的重放攻击和拒绝服务攻击。KAAP安全性存在漏洞,不能达到设计的预期目标。 As the Radio Frequency IDentification(RFID)technology is widely applied in admission control, payment, ticketing and supply chain management, the security and privacy issues become more and more serious. So it is imperative to design authentication protocols to resist possible attacks and threats. 2011, H. Ning etc. proposed a scalable and distributed key array authentication protocol(KAAP), which uses the distributed key architecture, access list mechanism and dynamic random number mechanism to resist both external attacks and internal forgery attacks. In this paper, we proposed two effective attacks are proposed to against the KAAP, and attacks analysis shows KAAP fails to resist external attacks including replay attack and Denial of Service attack effectively. Therefore, KAAP has security vulnerability and can not achieve the expected goals.
出处 《计算机工程与应用》 CSCD 2014年第16期72-76,共5页 Computer Engineering and Applications
基金 天津市自然科学基金项目(No.09JCYBJC00700)
关键词 外部攻击 密钥阵列 认证协议 射频识别 external attacks key array authentication Protocol Radio Frequency IDentification(RFID)
  • 相关文献

参考文献14

  • 1Pateriya R K, Sangeeta S.The evolution of RFID security and privacy: a research survey[C]//2011 International Con- ference on Communication Systems and Network Tech- nologies,2011 : 115-119.
  • 2Zuo Yanjun.Survivable RFID systems: issues, challenges, and techniques[J].IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 2010, 40(4) :406-418.
  • 3Song B, Mitchell C J.Scalable RFID security protocols supporting tag ownership transfer[J].Computer Communi- cations, 2011,34(4) : 556-566.
  • 4Song B.RFID authentication protocols using symmetric cryp- tography[D].London:University of London,2009.
  • 5轩秀巍.超高频射频识别系统的关键技术研究[D].天津:天津大学,2012.
  • 6Chen Y, Chou J, Sun H.A novel mutual authentication scheme based on quadratic residues for RFID systems[J]. Computer Networks, 2008,52 ( 12 ) : 2373-2380.
  • 7Chien Hung-Yu.Secure access control schemes for RFID systems with anonymity[C]//International Conference on Mobile Data Management, 2006.
  • 8EPCglobal Specification for RFID Air Interface.Radio fre- quency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz[S]. Version 1.0.9,2005-01.
  • 9Chien Hung-Yu.SASI:A new ultralightweight RFID authen- tication protocol providing strong authentication and strong integrity[J].IEEE Transactions on Dependable and Secure Computing, 2007,4(4) : 337-340.
  • 10丁治国,郭立,王昱洁.基于密钥阵列的RFID安全认证协议[J].电子与信息学报,2009,31(3):722-726. 被引量:15

二级参考文献9

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Finkenzeller K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons, 2003.
  • 3Sarma S E, Weis S A, and Engels D W. RFID systems and security and privacy implications. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHES 2002). Lectures Notes in Computer Science 2523. Berlin: Springer-Verlag, 2003: 454-469.
  • 4Sarma S E, Weis S A, and Engels D W. Pmdio frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes, 2003, 6(1): 2-9.
  • 5Ohkubo M, Suzuki K, and Kinoshita S. Hash-chain based forward secure privacy protection scheme for low-cost RFID. Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai, 2004: 719-724.
  • 6Rhee K, Kwak J, and Kim S. Challenge-response based RFID authentication protocol for distributed database environment Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005). Lectures Notes in Computer Science 3450. Berlin: Springer-Verlag, 2005: 70-84.
  • 7Hun WookKim and Shu YunLim. Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security. 2006 International Conference on Hybrid Information Technology (ICHIT~06), Ichit, 2006.11, Vol. 2: 718-723.
  • 8Henrici D and Muller P. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Percomv, 2004: 149-153.
  • 9Zhang Lan and Zhou Huaibei. An improved approach to security and privacy of RFID application system. Proceedings of 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005, Vol2: 1195-1198.

共引文献14

同被引文献11

  • 1CHIEN H Y.SASI:a new ultra-lightweight RFID authentication protocol providing strong authentication and strong integrity[J].IEEE Transactions on Dependable and Secure Computing,2007,4(4):337-340.
  • 2高树静.低成本无源RFID安全关键技术研究[D].济南:山东大学,2012.
  • 3RAPHAEL C W.Cryptanalysis of a new ultra-lightweight RFID authentication protocol-SASI[J].IEEE Transactions on Dependable and Secure Computing,2009,6(4):316-320.
  • 4TAQIEDDIN E,SARANGAPANI J.Vulnerability analysis of two ultra-lightweight RFD authentication protocols:RAPP and gossamer[C].The 7th International Conference for Internet Technology and Secured Transactions,2012:80-86.
  • 5GURUBANI J B,THAKKAR H,PATEL D R.Improvements over extended LMAP+:RFID authentication protocol[C].In:IFIP Advances in Infoomation and Communicatioh Fechnology,2012:225-231.
  • 6YAUKSEL K.Universal hashing for ultra-low-power cryptographic hardware applications[D].Worcester,MA,USA,Worcester Polytechnic Institute,2004.
  • 7BOLOTNYY L,ROBINS G.Physically unclonable function-based security and privacy in RFID systems[C].Pervasive Computing and Communications,Fifth Annual IEEE International Conference on,2007:211-220.
  • 8Huang Anqi,Zhang Chen,Tang Chaojing.Another improvement of LMAP++:a RFID authentication protocol[J].Communications in Computer and Information Science,2014(426):100-106.
  • 9王超,秦小麟,刘亚丽.对改进LMAP+协议的启发式攻击策略[J].计算机科学,2014,41(5):143-149. 被引量:3
  • 10周世杰,张文清,罗嘉庆.射频识别(RFID)隐私保护技术综述[J].软件学报,2015,26(4):960-976. 被引量:47

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部