期刊文献+

新的轻量级RFID双向认证协议:PUF-LMAP+ 被引量:7

A new lightweight mutual authentication protocol for RFID:PUF-LMAP+
下载PDF
导出
摘要 随着射频识别(RFID)技术越来越广泛的应用,其安全与隐私问题成为制约RFID技术的主要原因之一。为了降低标签的成本,有一些基于位操作的超轻量级安全认证协议被提出,但仅仅利用位操作的超轻量级安全认证协议安全性不能很好保证。本文针对改进的LMAP+安全认证协议不能够抵抗跟踪攻击和完全泄露攻击的问题,融合物理不可克隆函数(PUF)提出新的轻量级算法,新算法能够抵抗追踪攻击、完全泄露攻击和标签克隆攻击等攻击方法。 With the wide usage of radio frequency identification (RFID), its security and privacy have become the main problems which restrict the development of the technology. Some ultra-lightweight RFID authentication protocols have been proposed. They only in- volve simple bite-wise operations in order to reduce the cost of the tag. However, their protocols are unable to guarantee the strong se- curity property. What is more, the improved LMAP+ protocol is proven to be vulnerable to the tracking and full disclosure attacks. In this paper, we propose a new protocol which combines the improved LMAP+ with the physical unelonable function (PUF). Through analysis, the new protocol can prevent the tracking, the full disclosure, the cloning and other attacks.
作者 朱峰 白恩健
出处 《微型机与应用》 2016年第1期1-4,8,共4页 Microcomputer & Its Applications
关键词 RFID 轻量级 改进的LMAP+ 物理不可克隆函数 Radio Frequency identification lightweight improved lightweight mutual authentication protocol+ physical unclonablefunction
  • 相关文献

参考文献10

  • 1刘彦龙,白煜,滕建辅.RFID分布式密钥阵列认证协议的安全性分析[J].计算机工程与应用,2014,50(16):72-76. 被引量:2
  • 2CHIEN H Y.SASI:a new ultra-lightweight RFID authentication protocol providing strong authentication and strong integrity[J].IEEE Transactions on Dependable and Secure Computing,2007,4(4):337-340.
  • 3高树静.低成本无源RFID安全关键技术研究[D].济南:山东大学,2012.
  • 4RAPHAEL C W.Cryptanalysis of a new ultra-lightweight RFID authentication protocol-SASI[J].IEEE Transactions on Dependable and Secure Computing,2009,6(4):316-320.
  • 5TAQIEDDIN E,SARANGAPANI J.Vulnerability analysis of two ultra-lightweight RFD authentication protocols:RAPP and gossamer[C].The 7th International Conference for Internet Technology and Secured Transactions,2012:80-86.
  • 6GURUBANI J B,THAKKAR H,PATEL D R.Improvements over extended LMAP+:RFID authentication protocol[C].In:IFIP Advances in Infoomation and Communicatioh Fechnology,2012:225-231.
  • 7王超,秦小麟,刘亚丽.对改进LMAP+协议的启发式攻击策略[J].计算机科学,2014,41(5):143-149. 被引量:3
  • 8YAUKSEL K.Universal hashing for ultra-low-power cryptographic hardware applications[D].Worcester,MA,USA,Worcester Polytechnic Institute,2004.
  • 9BOLOTNYY L,ROBINS G.Physically unclonable function-based security and privacy in RFID systems[C].Pervasive Computing and Communications,Fifth Annual IEEE International Conference on,2007:211-220.
  • 10Huang Anqi,Zhang Chen,Tang Chaojing.Another improvement of LMAP++:a RFID authentication protocol[J].Communications in Computer and Information Science,2014(426):100-106.

二级参考文献40

  • 1Juels A.RFID security and privacy:A research survey[J].IEEE Journal on Selected Areas in Communication,2006,24(2):381-394.
  • 2Barrero D F,Hemández-Castro J C,Peris-Lopez P,et al.A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol[J].Expert Systems,2014,31(4):9-19.
  • 3Chien H Y.SASI:A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity[J].IEEE Transactions on Dependable and Secure Computing,2007,4(4):337-340.
  • 4Juels A,Molner D,Wagner D.Security and Privacy Issues in EPassports[C]// Security and Privacy for Emerging Areas in Communications Networks,2005.2005:74-88.
  • 5Kumar S,Paar C.Are Standards Compliant Elliptic Curve Cryptosystems Feasible on RFID?[C]// Workshop RFID Security,2006.2006:12-14.
  • 6Rhee K,Kwak J,Kim S,et al.Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment[C]//Proc.Int'l Conf.Security in Pervasive Computing.Berlin:Springer-Verlag,2005:70-84.
  • 7YangJ,ParkJ,LeeH,etal.MutualAuthentication Protocol[C]// Proc.Ecrypt Workshop RFID and Lightweight Crypto,2005.2005.
  • 8DucDN,LeeH,KimK.EnhancingSecurityofEPCglobalGen-2 RFID Tag against Traceability and Cloning[M].Auto-ID Labs Information and Communication University,2006.
  • 9Juels A.Strengthening EPC Tag against Cloning[C]// Proc.ACM Workshop on Wireless Security,2005.Cologne,2005:67-76.
  • 10Liu Ya-li,Qin Xiao-lin,Li Bo-han,et al.A Forward-Secure Grouping-proof protocol for Multiple RFID tags[J].International Journal of Computational Intelligence Systems,2012,5(5):824-833.

共引文献3

同被引文献37

引证文献7

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部