期刊文献+

基于伪随机函数的移动射频识别认证协议 被引量:4

Authentication protocol based on pseudo-random function for mobile radio frequency identification
下载PDF
导出
摘要 为解决移动射频识别(RFID)中阅读器和后端服务器之间因无线传输出现的安全问题,提出一种基于伪随机函数的移动RFID双向认证协议。该协议满足EPC Class-1 Generation-2行业标准,且实现了标签、阅读器和后端服务器之间的双向认证,并通过GNY逻辑证明了其安全性。该协议能有效抵抗追踪、重放、同步化等攻击,而且它将主要计算转移到后端服务器,因此能降低标签的运算量和标签成本。 To solve the security problems between the reader and the server of mobile Radio Frequency IDentification( RFID) caused by wireless transmission, a two-way authentication protocol based on pseudo-random function was provided. It satisfied the EPC Class-1 Generation-2 industry standards, and mutual certifications between tags, readers and servers were achieved. The security of this protocol was also proved by using GNY logic. It can effectively resist track, replay and synchronization attack etc.; simultaneously, its main calculations are transferred to the server, thereby reducing the calculations and cost of the tag.
出处 《计算机应用》 CSCD 北大核心 2015年第4期977-980,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61402265 61170054)
关键词 移动射频识别 伪随机函数 双向认证 GNY逻辑 mobile Radio Frequency IDentification(RFID) pseudo-random function two-way authentication GNY logic
  • 相关文献

参考文献2

二级参考文献18

  • 1谢桂海,齐子元,王新锋,刘毅.“联合全资产可视化”及其关键技术[J].军械工程学院学报,2005,17(1):43-46. 被引量:9
  • 2曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 3JUELS A. RFID security and privacy: A research survey[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381 -394.
  • 4OHKUBO M, SUZUKI K, KINOSHITA S. Hash-chain based forward secure privacy protection scheme for low-cost RFtD [ C]//Proceedings of t he 2004 Symposium on Cryptography and Information Security ( SCIS 2004). Sendai: [ s. n. ], 2004:719 - 724.
  • 5AVOINE G, OECHSLIN P. A scalable and provably secure hash based RFID protocol[ C]// In International Workshop on Pervasive Computing and Communication Security, Hawaii, USA, 2005. Kauai Island: IEEE Computer Society Press, 2005:110 -114.
  • 6WEISS A, SARMA S E, RIVEST R L. Security and privacy aspects of low-cost radio frequency identification systems [ C]// First Annual Conference on Security in Pervasive Computing, Boppard, Germany, 2003. Boppard: Springer, 2003:201-212.
  • 7HENRICI D, MULLER P. Hash-based enhancement of location privacy for radio frequency identification devices using varying identitiers[ C]// In 2nd IEEE Conference on Pervasive Computing and Communications Workshops ( PerCom 2004 Workshops), Orlando,FL, USA, 2004. Orlando: IEEE Computer Society Press, 2004: 149 - 153.
  • 8LEE S M, HWANG Y J, LEE D H. Efficient authentication for lowcost RFID systems[ C]// International Conference Computational Science and Its Applications--ICCSA, Singapore, 2005. Singapore: Springer Lecture Notes in Computer Science Press, 2005:619 -627.
  • 9GONG L, NEEDHAM R, YAHALOM R. Reasoning about belief in cryptographic protocols[ C]// Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, California, 1990. Oakland, California: IEEE Computer Society Press, 1990:234-248.
  • 10SAUL E, HUTCHISON A C M. A graphical enviroment for the facilitation of logic-based security protocol analysis [ J]. South African Computer Journal, 2000(26) : 196 -200.

共引文献14

同被引文献21

引证文献4

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部