期刊文献+

轻量级移动RFID认证协议研究设计 被引量:4

Research and Design of Lightweight Mobile RFID Authentication Protocol
下载PDF
导出
摘要 为解决移动射频识别(Mobile RFID)系统中信息通过无线信道传输所引发的安全与隐私问题,提出一种基于伪随机函数的轻量级移动RFID认证协议,实现后台服务器、阅读器与标签之间的双向认证。该协议中的运算主要集中在后台服务器和阅读器,可以有效地控制标签成本。安全性分析表明,该协议可以有效抵抗位置追踪、假冒、重放和同步化等攻击,并通过GNY逻辑进行了安全性证明。 In order to solve the security and privacy issues in the mobile radio frequency identification (RFID) system caused by wireless transmission, a lightweight mobile RFID authentication protocol based on pseudo-random function is provided, and mutu- al certifications between backend server, reader and tags are achieved. The operation of the protocol is mainly concentrated in the background server and the reader, which can effectively control the cost of the tag. Security analysis shows that the protocol can effectively resist the attack of location tracking, counterfeiting, replay and synchronization attack etc, and the security of this pro- tocol is proved by GNY logic.
出处 《计算机与现代化》 2016年第11期74-78,共5页 Computer and Modernization
基金 国家自然科学基金资助项目(61402265 61170054)
关键词 移动RFID 安全协议 双向认证 GNY逻辑 mobile RFID security protocol two-way authentication GNY logic
  • 相关文献

参考文献18

  • 1Sarma S E, Weis S A, Engels D W. RFID systems and se- curity and privacy implications [ C ]//The 4th Internation- al Workshop on Cryptographic Hardware and Embedded Systems. 2003:454-469.
  • 2Weis S A, Sarma S E, Rivest R L, et al. Security and pri- vacy aspects of low-cost radio frequency identification sys- tems [ J ]. Lecture Notes in Computer Science, 2003, 2802:201-212.
  • 3Ohkubo B M, Suzuki K, Kinoshita S. Hash-chain based forward-secure privacy protection scheme for low-cost RFID [ C ]// Proceedings of the Symposium on Cryptography & Information Security. 2004:719-724.
  • 4Dimitriou T. A secure and efficient RFID protocol that could make big brother ( partially ) obsolete [ C ]// Pro- ceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications. 2006:269- 275.
  • 5Molnar D, Soppera A, Wagne D. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags[C]// Proceedings of the 12th International Confer- ence on Selected Areas in Cryptography. 2005:276-290.
  • 6Hopper N J, Blum M. Secure human identification proto- cols [ C ]//Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Informa- tion Security: Advances in Cryptology. 2001:52-66.
  • 7Juels A, Weis S A. Authenticating pervasive devices with human protocols [ C ]// Advances in Cryptology-CRYPTO 2005, Springer Berlin Heidelberg. 2005:293-308.
  • 8Bringer J, Chabanne H, Dottax E. HB^ + ^ + : A light-weight authentication protocol secure against some attacks [ C ]// Proceedings of the 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing. 2006:28-33.
  • 9Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags [ C ]//Workshop on RFID Security, 2006. 2006 : 12-14.
  • 10Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. EMAP: An efficient mutual-authentication proto- col for low-cost RFID tags [ C ]// Proceedings of the 2006 International Conference on On the Move to Meaningful In- ternet Systems: AWeSOMe, CAMS, COMINF, IS, KSin- BIT, MIOS-CIAO, MONE. 2006:352-361.

同被引文献10

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部