期刊文献+

ECC结合轻量级Hash函数的RFID系统安全认证方案 被引量:2

A secure authentication scheme for RFID systems base on ECC and lightweight Hash
下载PDF
导出
摘要 针对植入式RFID系统的安全性和资源约束问题,提出一种基于椭圆曲线密码(ECC)和轻量级Hash函数的双向认证方案。在标签与阅读器之间进行通信时,首先利用椭圆曲线离散对数法对阅读器身份进行认证和验证;然后使用Quark轻量级哈希算法的椭圆曲线数字签名算法对标签身份进行认证和验证,减少了密钥和公钥的数据量,从而降低了计算量。实验结果表明,相比传统方案,本文提出的认证方案能有效抵抗与植入式RFID系统相关的攻击,安全等级更高。此外,该方案还降低了约48%的通信开销和24%的内存空间需求。 For the issues that the security and resource constraint of embedded RFID system, a mutual authentication scheme based on elliptic curve cryptography( ECC) is proposed. When communication between the tag and reader is happen, first, it use el-liptic curve discrete logarithm method to make certification and verification of identity of the reader. Then, use the elliptic curve digital signature algorithm that base on Quark light weight hash algorithm for certification and verification of identity of the tag, to reduce the key and public key sizes, as well as reduce the amount of calculation. The experimental results show that compared with the traditional method, this scheme can effectively resist the attack of RFID implant system and provides a higher security lev-el. At the same time, this scheme has 48 % less communication overhead and requires 24 % less total memory than the other ap-proaches.
出处 《电子技术应用》 北大核心 2015年第8期106-109,共4页 Application of Electronic Technique
基金 国家自然科学基金(40701146) 江河流域生态环境的集成感知与应用四川省院士(专家)工作站项目(2014YSGZZ02) 企业信息化与物联网测控技术四川省高校重点实验室项目(2014WZY05) 四川省智慧旅游研究基地规划项目(ZHY15-01) 网络工程专业综合改革项目(B1330400701) 自贡市科技局项目(2014DZ02)
关键词 RFID系统 植入式 双向认证 椭圆曲线密码 轻量级Hash函数 RFID system implant mutual authentication scheme elliptic curve cryptography lightweight Hash
  • 相关文献

参考文献11

二级参考文献42

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:101
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. 被引量:32
  • 4张文芳,何大可,王小敏.基于可变权限集的广义虚拟企业信任交互方案[J].计算机集成制造系统,2007,13(5):1001-1007. 被引量:8
  • 5JUELS A, R/VEST R, SZYDLO M. The blocker tag: Selective blocking of RFID tags for consumer privacy[C]// Proceeding of the 8th ACM Conference on Computer and Communication Security. New York: ACM, 2003: 103-111.
  • 6PEDRO P L, JUL10 C H C, JUAN M, et al. RFID system: a survey on security threats and proposed solutions[J]. Lecture Notes in Computer Science, 2006, 42(17): 159-170.
  • 7SARMA S E, WEI S A, ENGLES D W. Radio-frequency identification: Security risks and challenges[J]. CryptoBytes Technical Newsletter from RSA Laboratories, 2003, 6(1): 2-9.
  • 8LEE S M, HWANG Y J, LEED H, et al. Efficient authentication for low cost RFID System[C]//Intemational Conference on Computational science and its Applications. Singapore: Wodd Scientific Publish Company, 2005: 619-627.
  • 9HENRICI D, MAULLER P. Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers[C]//lntemational Workshop on Pervasive Computing and Communication. Orlando, USA: [s.n.], 2004: 149-153.
  • 10SEIS A, SAIMA S E, RIVEST R L. Security and privacy aspects of low-cost radio frequency identification System[C]//Proceeding of the 1st International Conference on Security in Pervasive Computing. [S.l.]: Springer, 2004: 201-212.

共引文献49

同被引文献30

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部