期刊文献+

一种基于时间戳的移动RFID认证协议

An Authentication Protocol of Mobile RFID Based on Timestape
下载PDF
导出
摘要 针对一些无线射频识别RFID协议易受到重放攻击,设计一种基于时间戳的移动RFID认证协议,认证过程中,阅读器带上时间戳常量,有效地避免一些动态RFID协议中存在的阅读器重放和冒充攻击问题.本文采用伪随机数和共享密钥机制,提出一种轻量级的移动RFID认证协议,实现阅读器、服务器和标签的双向认证,分析表明,给出的协议能有效地抵御各种攻击,具有较高的执行效率. Some Radio Frequency IDentification(RFID)protocols are vulnerable to replay attacks,this paperpresents a RFID protocol based on timestamp. During the authentication,the reader takes the timestamp con-stant,which effectively avoids the problem of replay and impersonation attack in some mobile RFID proto-cols. Based on the pseudo random number and shared key mechanism,the paper proposes a lightweight mo-bile RFID authentication protocol,it implements the mutual authentication among the tags,readers,and serv-er. Analysis shows that proposed protocol can effectively resist various attacks,has relatively high executionefficiency compared with the other protocols.
作者 孙梅 张娟
出处 《淮北师范大学学报(自然科学版)》 CAS 2017年第4期28-32,共5页 Journal of Huaibei Normal University:Natural Sciences
基金 安徽省高等学校省级质量工程项目(2016ckjh180 2016tszy074) 2016安徽省大学生创新创业计划项目(201610373066)
关键词 射频识别 时间戳 认证 radio frenquency IDentification(RFID) timestamp authentication
  • 相关文献

参考文献5

二级参考文献71

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Henrici D. RFID Security and Privacy: Concepts, Protocols, and Architectures [M]. Berlin: Springer, 2008.
  • 3Berbain C, Billet O, Etrog J, et al. An efficient forward private RFID protocol [C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:43-53.
  • 4Peris-Lopez P, Hernandez-Castro C, Estevez-Tapiador M, et al. LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags [C] //Proc of the 2nd Workshop on RFID Security. Berlin: Springer, 2006: 1-12.
  • 5Chien H Y, Chen C H. Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards[J]. Computer Standards : Interfaces, 2007, 29(2): 254-259.
  • 6Karthikeyan S, Nesterenko M. RFID security without extensive cryptography [C] //Proc of SASN'05. New York: ACM, 2005: 63-67.
  • 7Duc N, Park J, Lee H, et al. Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning [OL]. [2013-12-01]. http://autoidlabs, org/uploads/media/ AUTOIDLABS-WP-SWNET-016. pdf?.
  • 8Ohkubo M, Suzuki K, Kinoshita S. Cryptographic approach to " privacy-friendly" tags [C] //Proc of RFID Privacy Workshop. New York: ACM, 2003:1-9.
  • 9Vaudenay S. On privacy models for RFID [C]//LNCS 4833: Proc of Advances in Cryptology-Asiacrypt 2007. Berlin: Springer, 2007: 68-87.
  • 10Juels A, Weis S A. Defining strong privacy for RFID [C] // Proc of the 5th Annual IEEE lnt Conf on Pervasive Computing and Communications Workshops. Piscataway, NJ: IEEE, 2007:342-347.

共引文献75

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部