期刊文献+

基于自组合交叉位运算的超轻量移动认证协议 被引量:3

Ultra-lightweight mobile authentication protocol based on self-assembly crossover
下载PDF
导出
摘要 针对无线射频识别(RFID)系统移动认证中存在的系统成本较高、无线通信不安全等问题,提出一种超轻量级移动RFID认证协议。给出自组合交叉位运算的定义,结合移位、异或运算加密秘密通信数据,使协议达到超轻量级别,降低系统成本;以完整三方认证过程为基础,利用随机数的新鲜性原则实现三方密钥更新机制,保证系统安全性。GNY逻辑形式化证明表明了该协议的有效可达性,安全性描述分析与性能对比统计验证了该协议具有高安全、低成本特性。 To solve the problems of high system cost and wireless communication insecurity in mobile radio frequency identification(RFID)system,an ultra-lightweight mobile RFID authentication protocol was proposed.Definition to explain the combination of self-assembly crossover operation was provided.Combined with the shift and XOR,communication data were encrypted,and the agreement reached ultra-lightweight level,reducing the cost of the system.On the basis of the three party authentication process,the key of the system was updated using the freshness of the random number,and the security of the wireless communication was guaranteed.The GNY logic formal proof was given to show the availability of the protocol.Through the security analysis and performance comparison,it is verified that the protocol has high security and low cost.
出处 《计算机工程与设计》 北大核心 2017年第12期3252-3257,共6页 Computer Engineering and Design
基金 广西区高校科研基金项目(KY2015Y13530) 广西邕宁区基金项目(20160321A)
关键词 移动 无线射频识别 自组合交叉位运算 超轻量级 三方认证 密钥更新 GNY逻辑 mobile radio frequency identification(RFID) self-assembly crossover ultra-lightweight three party authentication key updating GNY logic
  • 相关文献

参考文献10

二级参考文献111

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 3WEISS A. Security and privacy in radio-frequency identification de- vices [ D]. Cambridge: Massachusetts Institute of Technology, De- partment of Electrical Engineering and Computer Science, 2003.
  • 4WEIS S, SARMA S, RIVEST R, et al. Security and privacy aspects of low-cost radio frequency identification systems[ C]// Proceedings of Security in Pervasive Computing'04. Piscataway: IEEE Computer Society Press, 2004:201 -212.
  • 5OHKUBO M, SUZUKI K, KINOSHTCA S. Cryptographic approach to "Privacy-Friendly" tags[ C]//Proceedings of RFID Privacy Work- shop. Cambridge: Massachusetts Institute of Technology Press, 2003:212 -219.
  • 6GONG L, NEEDHAM R, YAHALOM R. Reasoning about belief in cryptographic protocols[ C] // Proceedings of the 1990 IEEE Com- puter Society Symposium on Research in Security and Privacy. Wash- ington, DC: IEEE Computer Society, 1990:234 - 248.
  • 7Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. LMAPA Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags[C]//Graz, Austria. Proceedings of the 2nd Workshop on RFID Security. New Jersey, USA: IEEE Press, 2006 : 137-148.
  • 8Chien H Y. SASh A New Ultra-lightweight RFID Authentica- tion Protocol Providing Strong Authentication and Strong Integ- rity[J]. IEEE Trans. Dependable and Secure Computing!, 2007, 4(4):337-340.
  • 9Li Tie-yam Employing Lightweight Primitives on Low-cost RFID Tags for Authentication[C]//Calgary, BC. Vehicular Technology Conference. 2008 : 1-5.
  • 10Bagheri N, Sefkhani M, Naderi M, et al. Security Analysis ofLMAPA- +, an RFID Authentication Protocol[C]//Abu Dhabi. 6th International Conference on Internet Technology and Se- cured Transactions. 2011 : 689-694.

共引文献83

同被引文献18

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部