期刊文献+

一种基于散列函数的RFID安全认证方法 被引量:1

A secure authentication method based on hash ,function for RFID system
下载PDF
导出
摘要 RFID系统中有限的标签芯片资源,导致数据与信息的安全成为RFID系统的重要问题之一,散列函数的单向性为RFID的识别和认证提供了一种既可靠又有效的途径。在分析了现有几种典型散列认证协议的基础上,提出了一种新的基于散列函数的安全认证协议。本协议旨在解决手持式、无线连接的RFID阅读器与标签、服务器间的识别,利用散列函数实现服务器、阅读器以及电子标签三者之间的相互认证。经过安全性与性能的分析,新协议在采用较小的存储空间和较低的运算开销的情况下,可抵抗已知的大多数攻击,有效地保证了RFID系统中数据和隐私的安全,实现了终端与服务器间的双向认证和匿名认证,非常适合于在大型分布式系统中使用。 Limited by the tag chip resource of a radio-frequency identification (RFID) system, the data and informa- tion security has been an important issue of an RFID system. The one-way Hash function provides an efficient and reliable approach for the identification and authentication of the RFID system. Based on the analysis of several typi- cal Hash authentication protocols, a novel secure authentication protocol based on the Hash function was proposed. The protocol was intended to tackle the identification among the handheld RFID reader, tags and server. Specifically, the protocol utilizes the Hash function to achieve the mutual authentication between the above three objects. The per- formance analysis shows that the proposed protocol can resist the most known attacks with reduced storage capacity and lower computation overhead. Therefore, the proposed strategy effectively ensures the data and privacy security of the RFID system, achieving the bidirectional anonymous authentication between the terminal and server, which is very suitable for the distributed large-scale RFID system.
作者 李川 李学俊
出处 《电信科学》 北大核心 2017年第6期129-137,共9页 Telecommunications Science
基金 四川省教育厅自然科学重点项目(No.15ZA0369)~~
关键词 RFID 散列函数 安全 认证协议 RFID, hash function, security, authentication protocol
  • 相关文献

参考文献6

二级参考文献39

  • 1顾春霞,张广泉.基于WEB的图书管理系统体系结构建模与实现[J].科技经济市场,2006(10):27-28. 被引量:1
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 3HA J, MOON S, et al. Lightweight and resynchronous mutual authentication protocol for RFID system[A]. LNCS[C]. 2007.4412:80-89.
  • 4TAN C C, SHENG B, LI Q. Secure and serverless RFID authentication and search protocols[J].IEEE Transactions on Wireless Communications, 2008, 7 (4): 1400-1407.
  • 5CHEN C L, DENG Y Y. Conformation of EPC class 1 and generation 2 standards RFID system with mutual authentication and privacy protection[J]. Engineering Applications of Artificial Intelligence, 2009, 22(8):1284-1291.
  • 6CAI S, LI Y, LI T, et al. Attacks and improvements to an RFID mutual authentication protocol[A]. WiSec '09[C]. 2009.51-58.
  • 7PIRAMUTHU S. RFID mutual authentication protocols[J]. Decision Support Systems, 2011, 50(2):387-393.
  • 8PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, TAPIADOR J E, et al. Cryptanalysis of an EPC class-lgeneration-2 standard compliant authentication protocol[J]. Engineering Applications of Artificial Intel- ligence, 2011, 24(6):1061-1069.
  • 9GODOR G, GICZI N, SANDOR I. Elliptic curve cryptography based mutual authentication protocol for low computational complexity environment[A]. ISWPC'2010[C]. 2010. 331-336.
  • 10HOPPER N J, BLUM M. Security human identification protocol[A]. ASIACRYPT'01 [C]. 2001.52-66.

共引文献57

同被引文献11

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部