期刊文献+

一种改进的基于Hash函数的RFID双向认证协议 被引量:5

An Improved RFID Mutual Authentication Protocol Based on Hash Function
下载PDF
导出
摘要 针对物联网应用中,基于Hash函数的Radio Frequency Identification(RFID,射频识别)安全认证协议存在缺陷以及安全协议认证效率不高等问题,提出了一种改进的基于Hash函数的RFID双向安全认证协议,协议能保护标签的数据隐私,防止重放、追踪、伪造等攻击.通过和已有的此类安全认证协议进行安全性分析和性能比较,结果表明该协议具有更高的认证效率,并且引入了标签认证标志Tuse、Tstore以及动态秘密值S,能有效地防止去同步化攻击的威胁,适用于低成本的RFID系统. In view of the existing defects of RFID authentication protocol , based on the Hash function , and the low efficiency of the security protocol authentication in the application of the Internet of Things , it proposed an improved RFID security mutual authentication protocol , based on the Hash function .This protocol can protect data privacy , and prevent replay attack , privacy track , and spoofing attack .Com-pared with other protocols of this kind in security and performance , this protocol, which uses Label certi-fication mark Tuse , Tstore and dynamic secret value S , can prevent desynchronization attack , has higher efficiency , and is suitable for low-cost RFID systems .
出处 《广东工业大学学报》 CAS 2014年第3期62-66,共5页 Journal of Guangdong University of Technology
基金 广东省自然科学基金重点资助项目(S2012020011071) 广东省教育部产学研合作项目(2012B091000037 2012B091000041) 广州市科技计划项目(2013J4300058) 广东省高等院校学科建设专项资金科技创新项目(2013kjcx0064)
关键词 物联网 HASH函数 射频识别(RFID) 安全认证 协议安全 Intemet of Things Hash function radio frequency identification (RFID) security authenti-cation protocol security
  • 相关文献

参考文献15

  • 1Vermesan O, Harrison M, Vogt H. Internet of things strate- gic research roadmap, CERP-IOT Report [ R ]. Brussels: European Commission-Information Society and Media DG, 2009.
  • 2International Telecommunication Union. ITU Internet Re- ports 2005 : The Internet of Things [ R ]. Geneva: ITU, 2005.
  • 3雷吉成.物联网安全技术[M].北京:电子工业出版社,2012:34-35.
  • 4罗利平,蒋勇.基于物联网技术的大宗农产品质量安全监控体系[J].中国科技论坛,2012(12):127-133. 被引量:12
  • 5吴晓钊,王继祥.物联网技术在物流业的应用现状与发展前景[J].物流技术与应用,2011,16(2):52-56. 被引量:68
  • 6Lee Y, Batina L, Singel' ee D. Low-cost Untraceable Au- thentication Protocols for RFID [ C]//Proc of the 3rd ACM Conference on Wireless Network Security (WiSec2010). New York: Hoboken, 2010:55-64.
  • 7Finkenzeller K. RFID Handbook: Fundamentals and Appli-cations in Contactless Smart Cards, Radio Frequency Iden- tification and Near-field Communication[ M]. 3rd Edition, London: John Wiley & Sons, 2010.
  • 8丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592. 被引量:93
  • 9谢川.结合Hash函数和密钥阵列的RFID安全认证协议[J].计算机应用,2011,31(3):805-807. 被引量:8
  • 10Lee S. Mutual authentication of RFID system using syn- chronized secret information [ D ]. Korea Daejeon: School of Engineering, Information and Communications Universi- ty, 2005.

二级参考文献73

  • 1李斌,蒋卫寅,凌力.一种基于Key值更新的RFID安全协议设计[J].微型电脑应用,2011(7):15-18. 被引量:2
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3杨世平,李祥.BAN逻辑在协议分析中的密钥猜测分析缺陷[J].计算机工程,2006,32(9):126-127. 被引量:4
  • 4International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 5Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 6Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 7Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 8Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 9Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 10Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003

共引文献189

同被引文献26

引证文献5

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部