期刊文献+

面向智慧园区的RFID系统信息安全认证方案 被引量:4

A security authentication scheme in RFID system for smart park
下载PDF
导出
摘要 RFID系统本身在设备身份认证及信息传输过程中存在众多安全漏洞,且现有的RFID安全认证大多为重量级认证,必然会加重认证双方的信息处理负担,导致出现有效信息率低的问题。为此,对ARAP加以改进,提出了一种可靠的轻量级RFID系统信息安全认证协议(DARAP),该协议可以有效抵抗重传、跟踪、欺骗、克隆和去同步等多种攻击手段,具有较高的安全性和实用性。 There exist many security vulnerabilities in device's identity verification and the information transmition through RFID system, the computations and procedures in the classical RFID authentication protocols are so complex that will impose processing burdens on the data base or readers, leading to the problem of low effective information rate. To solve the problem, an improvement of ARAP protocol which called DARAP was proposed to realize authentication in RFID system for smart park. The new protocol could effectively resist attacks of re-transmission, tracking, deception, cloning and de-synchronizationand, and it had high security and practicability.
出处 《电信科学》 北大核心 2016年第2期164-169,共6页 Telecommunications Science
关键词 RFID 智慧园区 轻量级 DARAP RFID, smart park, lightweight, DARAP
  • 相关文献

参考文献12

  • 1PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, TAPIADOR J M E, et al. M2AP: a minimalist mutual-authentication protocol for low cost RFID tags [J]. Lecture Notes in Computer Science, 2006, 4159(10): 912-923.
  • 2LI T, WANG G. Security analysis of two ultra-lightweight RFID authentication protocols[C]//IFIP RC-11 International Information Security Conference, May 14-16, 2007, Sandton, South Africa. Berlin: Springer US, 2007: 109-120.
  • 3CHIEN H Y. SASI: a new ultra lightweight RFID authentication protocol providing strong authentication and strong integrity[J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4): 337-340.
  • 4CAO T, BERTINO E, LEI H. Security analysis of the SASI protocol [J]. IEEE Transactions on Dependable and Secure Computing, 2009, 6(1): 73-77.
  • 5PHANR C W. Cryptanalysis of a new ultralight-weight RFID authentication protocol [J]. IEEE Transactions on Dependable and Secure Computing, 2009, 6(4): 316-320.
  • 6SUN H M, TING W C, WANG K H. On the security of Chien' sultralight-weight RFID authentication protocol [J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(2): 315-317.
  • 7ARCO P D, SANTISA D E. On ultralight-weight RFID authentication protocols [J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(4): 548-563.
  • 8PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, TAPIADOR J M E, et al. Advances in ultra lightweight cryptography for low-cost RFID tags: gossamer protocol [C]//International Workshop on Information Security Applications, September 23-25, 2008, Jeju Island, Korea.Berlin: Springer US, 2008: 56-68.
  • 9HERNANDEZ-CASTRO J C, PERIS-LOPEZ P, PHAN R C W, et al. Cryptanalysis of the david-prasad RFID ultralightweight authentication protocol [C]//International Workshop on Radio Frequency Identification: Security and Privacy Issues, June8-9, 2010. lstanbul, Turkey. Berlin: Springer US, 2010: 22-34.
  • 10辛伟,郭涛,董国伟,王欣,邵帅.RFID认证协议漏洞分析[J].清华大学学报(自然科学版),2013,53(12):1719-1725. 被引量:5

二级参考文献34

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Finkenzeller K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons, 2003.
  • 3Sarma S E, Weis S A, and Engels D W. RFID systems and security and privacy implications. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHES 2002). Lectures Notes in Computer Science 2523. Berlin: Springer-Verlag, 2003: 454-469.
  • 4Sarma S E, Weis S A, and Engels D W. Pmdio frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes, 2003, 6(1): 2-9.
  • 5Ohkubo M, Suzuki K, and Kinoshita S. Hash-chain based forward secure privacy protection scheme for low-cost RFID. Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai, 2004: 719-724.
  • 6Rhee K, Kwak J, and Kim S. Challenge-response based RFID authentication protocol for distributed database environment Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005). Lectures Notes in Computer Science 3450. Berlin: Springer-Verlag, 2005: 70-84.
  • 7Hun WookKim and Shu YunLim. Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security. 2006 International Conference on Hybrid Information Technology (ICHIT~06), Ichit, 2006.11, Vol. 2: 718-723.
  • 8Henrici D and Muller P. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Percomv, 2004: 149-153.
  • 9Zhang Lan and Zhou Huaibei. An improved approach to security and privacy of RFID application system. Proceedings of 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005, Vol2: 1195-1198.
  • 10Myung-Ho P, Ki-Gon N, Jin S, et al. Unilateral distance bounding protocol with bidirectional challenges [J]. IEICE Transactions on Information and Systems, 2013, E96-D(1) : 134 - 137.

共引文献18

同被引文献51

  • 1Juels A. RFID security and privacy: a research survey [ J ]. IEEE Journal on Selected Areas in Communication,2006,24 (2) :381-394.
  • 2Yen Y, Lo N, Wu T. Two RFID-based solutions for secure in- patient medication administration[ J ]. Journal of Medical Sys- tems ,2012,36 ( 5 ) :2769-2778.
  • 3Juels A, Rivest R L, Szudlo M. The blocker tag : selective bloc- king of RFID tags for consumer privacy [ C ]//Proc of 10th ACM conference on computer and communications security.New York : ACM ,2003 : 103-111.
  • 4Tuyts P, Batina L. RFID-tags for anti-counterfeiting[ C ]// Proc of topics in cryptology. Berlin: Springer, 2006 : 115-131.
  • 5Batina L, Guajardo J, Kerins T, et al. Public-key cryptography for RFID tags [ C ]//Proc of the 5th annual IEEE international conference on pervasive computing and communications work-shops. New York : IEEE ,2007:217-222.
  • 6Schnorr C P. Efficient identification and signatures for smart cards[ C]//Proc of advances in cryptology. Berlin:Springer, 1990:239-252.
  • 7Okamoto T. Provably secure and practical identification sch- emes and corresponding signature schemes [ C ]//Proc of ad- vances in cryptology. Berlin: Springer, 1993:31-53.
  • 8Lee Y K,Batina L,Verbauwhede I. EC-RAC (ECDLP based Randomized Access Control) :provably secure RFID authenti-cation protocol[ C]//Proc of the IEEE internationld confer- ence on RFID. Las Vegas:IEEE,2008:97-104.
  • 9Deursen T, Radomirovic S. Untraceable RFID protocols are not trivially composable :attacks on the envision of EC-FAC [ R ]. Luxembourg : University of Luxembourg,2009.
  • 10Lee Y, Batina L, Verbanwhede I. Privacy challenges in RFID systems [ C]//Proc of the internet of things 2010. Berlin: Springer, 2010 : 397 -407.

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部