期刊文献+

抗去同步化的轻量级RFID双向认证协议 被引量:4

Lightweight anti-desynchronization RFID mutual authentication protocol
下载PDF
导出
摘要 针对低成本RFID应用中轻量级认证协议的安全性进行研究,提出一种组合型去同步化攻击方法,该类攻击不用篡改任何协议消息,仅通过拦截、窃听、重放等攻击手段的顺序组合就能导致后台数据库/标签的共享密钥失去同步;设计一种轻量级抗去同步化的RFID双向认证协议,并利用形式化工具CPN Tools模拟运行该协议,该协议可以达到预期状态空间;与同类RFID协议相比,该协议在满足一般隐私安全属性的同时,还能有效抵抗来自恶意阅读器的组合型去同步化攻击,同时能有效减少RFID系统的计算开销,弥补原始协议的不足,更适合低成本RFID系统应用的隐私安全需求。 In researching the Lightweight authentication protocol in low-cost RFID applications, a kind of combinational desynchronization attack was proposed which could make the shared keys desynchronize without message manipulation, and a lightweight anti-desynchronized mutual authentication protocol, of which the state teachability was proved by the formal simulation with CPN tools was proposed. The results show that in addition to meeting the conventional security and privacy requirements, the proposed protocol is able to resist the combinational desynchronization attack in comparison with similar protocols. Since it can effectively save the RFID system's computation overhead by decreasing the calculation times of the one-way Hash, the proposed protocol is more suitable for low-cost RFID applications than others.
出处 《中南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2015年第6期2149-2156,共8页 Journal of Central South University:Science and Technology
基金 国家重点基础研究发展计划(973计划)项目(2012cb724400) 国家自然科学基金资助项目(61170268)~~
关键词 射频识别技术 RFID双向认证协议 CPN形式化分析 去同步化攻击 隐私安全性 radio fi'equency identification technology RFID mutual authentication protocol colored petri-net formal analysis desynchronization attacks privacy and security
  • 相关文献

参考文献17

  • 1Chien H Y. SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity[J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(9): 337-340.
  • 2Due D N, Kim K. Defending RFID authentication protocols against DoS attacks[J]. Computer Communications, 2011, 34(3): 384-390.
  • 3Song B, Mitchell C J. Scalable RFID security protocols supporting tag ownership transfer[J]. Computer Communications,, 2011, 34(4): 556-566.
  • 4Peris L P, Hemandez Castro J C, Juan M T. Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol[M]. Berlin, Heidelberg: Spring-Vedag, 2009: 56-68.
  • 5Lira J, Oh H, Kim S. A new Hash-based RFID mutual authentication protocol providing enhanced user privacy protection[C]//Proceedings of the 4th Information Security Practice and Experience Conference. Berlin: Springer-Verlag, 2008: 278-289.
  • 6Lopez P, Li P, Lira T, et al. Vulnerability analysis of a mutualauthentication scheme under the EPC class-1 generation-2 standard[J]. Computer Communications, 2009, 11 (8): 1185-1193.
  • 7Li T Wang. Security analysis of two ultra-lightweight RFID authentication protocols[C]//Proceedings of the IFIP TC-11 22nd International Information Security Conference. South Africa, 2007: 109-120.
  • 8Avoine G, Carpent X. Strong Authentication and Strong Integrity (SASI) is Not That Strong[C]//The 6th International Workshop. Turkey: Istanbul, 2010: 50-64.
  • 9ZHOU Shijie, ZHANG Zhen, LUO Zongwei. A lightweight anti-desynchronization RFID authentication protocol[J], Information Systems Frontiers, 2010, 12(5): 521-528.
  • 10周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:209

二级参考文献29

  • 1RuiXue Deng-GuoFeng.New Semantic Model for Authentication Protocols in ASMs[J].Journal of Computer Science & Technology,2004,19(4):555-563. 被引量:5
  • 2Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 3Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 4Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 5Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 6Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 7Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 8Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 9Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 10Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121

共引文献266

同被引文献29

引证文献4

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部