期刊文献+

一种新型无后端数据库的RFID安全认证协议 被引量:2

A novel serverless authentication protocol for RFID
下载PDF
导出
摘要 对某无后端数据库RFID安全认证协议的安全性进行了分析,并针对其安全漏洞,给出了一种新型的无后端数据库的RFID安全认证协议。对新协议的安全性分析表明:该协议能够满足双向认证、匿名性、抗追踪攻击、抗克隆攻击、抗物理攻击、抗窃听、抗拒绝服务攻击以及失同步攻击等要求。最后,给出了新协议的BAN逻辑证明。 This paper proposes a new serverless authentication protocol for RFID. The protocol can meet the requirements such as mutual authentication anonymity, resistance to being tracked and at- tacked, protection against clone attack, physical attack and eavesdropping, denial of service attack as well as out-of-synchronization attack. Finally, the BAN logical proof of the protocol is provided.
出处 《海军工程大学学报》 CAS 北大核心 2015年第2期32-36,共5页 Journal of Naval University of Engineering
基金 国家自然科学基金青年基金资助项目(61100042)
关键词 信息安全 RFID 安全认证协议 无后端数据库 information security RFID secure authentication protocol serverless
  • 相关文献

参考文献7

二级参考文献71

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:99
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 3Henrici D. RFID Security and Privacy: Concepts, Protocols, and Architectures [M]. Berlin: Springer, 2008.
  • 4Berbain C, Billet O, Etrog J, et al. An efficient forward private RFID protocol [C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:43-53.
  • 5Peris-Lopez P, Hernandez-Castro C, Estevez-Tapiador M, et al. LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags [C] //Proc of the 2nd Workshop on RFID Security. Berlin: Springer, 2006: 1-12.
  • 6Chien H Y, Chen C H. Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards[J]. Computer Standards : Interfaces, 2007, 29(2): 254-259.
  • 7Karthikeyan S, Nesterenko M. RFID security without extensive cryptography [C] //Proc of SASN'05. New York: ACM, 2005: 63-67.
  • 8Duc N, Park J, Lee H, et al. Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning [OL]. [2013-12-01]. http://autoidlabs, org/uploads/media/ AUTOIDLABS-WP-SWNET-016. pdf?.
  • 9Ohkubo M, Suzuki K, Kinoshita S. Cryptographic approach to " privacy-friendly" tags [C] //Proc of RFID Privacy Workshop. New York: ACM, 2003:1-9.
  • 10Vaudenay S. On privacy models for RFID [C]//LNCS 4833: Proc of Advances in Cryptology-Asiacrypt 2007. Berlin: Springer, 2007: 68-87.

共引文献54

同被引文献21

  • 1Sarma, S.E.,Weis,S. A.,& Engels,D.W.(2003).RFID systems and security and privacy implications[J].In Cryptographic Hardware and Embedded Systems- CHES 2002:454-469.Springer Berlin Heidelberg.
  • 2Hertrici D,Miiller P.Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers[C]//Pervasive Computing and Communications Workshops,2004. Proceedings of the Second IEEE Annual Conference on.IEEE,2004:149-153.
  • 3Tan C C, Sheng B,Li Q.Secure and serverless RFID authentication and search protocols[J]. Wireless Communications, IEEE Transactions on, 2008,7(4):1400-1407.
  • 4Chen S M,Wu M E,Sun H M,et aI.CRFID.An RFID system with a cloud database as a back-end server[J].Future Generation Computer Systems, 2014, 30: 55-161.
  • 5Kardas S,Celik S,Bingol M A,et al.A new security and privacy framework for RFID in cloud computing[C]//Cloud Computing Technology and Science (CloudCom),2013 IEEE 5th International Conference on. IEEE,2013,1:171-176.
  • 6Xie W, Xie L,Zhang C,et al.Cloud-based RFID authentication[C]//FID(RFID),2013 IEEE International Conference on. IEEE,2013:168-175.
  • 7Kiraz M S,Bingel M A,Kardas S,et al.Anonymous RFID authentication for cloud scrviccs[J].Intcmational Journal of Information Security Science,2012,1 ,(2):32-42.
  • 8卢欢欢,李飞.基于哈希的RFID安全协议的研究[J].计算机安全,2013(2):6-10. 被引量:3
  • 9刘飞飞,刘宴兵.基于社交网络的智能手机轻型安全认证协议设计[J].重庆邮电大学学报(自然科学版),2013,25(1):132-137. 被引量:4
  • 10李红静,刘丹.基于矩阵理论的RFID认证协议设计及BAN逻辑分析[J].计算机应用,2013,33(7):1854-1857. 被引量:3

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部