期刊文献+

低成本RFID协议的设计及BAN形式化分析

The design of low-cost RFID protocols and BAN formal analysis
下载PDF
导出
摘要 目的通过分析现有的典型RFID认证协议的效率与成本,针对数字化图书馆RFID认证协议的高成本问题,提出一个低成本的RFID认证协议。方法通过去掉标签中的随机数模块,然后利用阅读器存储能力强、存储随机数模块来确保发出消息的新鲜性。结果该低成本RFID认证协议仅使用一对提前预约好的密钥对,降低了标签的硬件成本和计算能力。结论通过BAN形式化分析,该协议达到了预期的安全协议的认证目标,非常适合于低成本的RFID系统。 Purposes--To put forward a low-cost RFID authentication protocol in accordance with the cost problem of the RFID authentication protocol for digital library by analyzing the efficiency and cost of existing classic RFID authentication protocol. Methods--By removing the random module, the great storage capacity of reader was used to ensure the freshness of outgoing message. Results--The aforesaid low-cost RFID authentication protocol only using a pair of scheduled key pair can reduce the cost and computing power of the tagged hardware. Conclusion--After the BAN formal analysis, this low-cost protocol can achieve the desired authentication goals of security protocol, which is very suit- able for the low-cost RFID system.
作者 马巧梅
出处 《宝鸡文理学院学报(自然科学版)》 CAS 2016年第1期60-62,72,共4页 Journal of Baoji University of Arts and Sciences(Natural Science Edition)
基金 国家青年科学基金资助项目(61402015) 陕西省教育厅科学研究计划基金资助项目(14JK1047) 陕西省教育厅专项科研计划资助项目(15JK1022)
关键词 RFID系统 协议 形式化分析 BAN逻辑 RFID system protocol formal analysis BAN logic
  • 相关文献

参考文献6

二级参考文献58

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3Feldhofer M. Comparison of low-power implementations of Trivium and Grain//Proceedings of the Workshop on the State of the Art of Stream Ciphers (SASC 2007). Bochum, Germany, 2007:236-246.
  • 4Feldhofer M, Wolkerstorfer J. Strong crypto for RFID tags--A comparison of low-power hardware implementations//Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 2007). New Orleans, USA, 2007, 27-30.
  • 5Haitner I, Reingold O, Vadhan S. Efficiency improvements in constructing pseudorandom generator from any one-way function//Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC 2010). Cambridge, USA, 2010: 437-446.
  • 6Juels A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394.
  • 7Juels A, Pappu R, Parno B. Unidirectional key distribution across time and space with applications to RFID security// Proceedings of the 17th USENIX Security Symposium. San Jose, Canada, 2008:75-90.
  • 8Molnar D, Wagner D. Privacy and security in library RFID.. Issues, practices, and arehitectures//Proceedings of the Conference on Computer and Communications Security (ACM CCS'04). Washington, USA, 2004:210-219.
  • 9Li Y, Ding X. Protecting RFID communications in supply chains//Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS' 07). Singapore, Singapore, 2007: 234-241.
  • 10Ma C, Li Y, Deng R, Li T. RFID privacy.. Relation between two notions, minimal condition, and efficient construction// Proceedings of the 16th ACM Conference on Computer and Communications Security (ACM CCS- 09). Chicago, USA, 2009, 54-65.

共引文献88

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部