期刊文献+

基于M序列的轻量级RFID认证协议

A Light-Weight RFID Authentication Protocol Based on M-Sequence
下载PDF
导出
摘要 尽管RFID的应用领域越来越广泛,但其安全和隐私保护问题没有得到很好的解决.在以前的大多数RFID认证协议中,服务器的搜索量和标签的个数有关,基于M序列提出了一种轻量级RFID认证协议.在提出的协议中,服务器的搜索量和标签个数无关.基于M序列的伪随机性和利用Hash函数的单向性,该协议具有抗重放、抗分析、防伪造、防跟踪等安全属性. Although the RFID technology is more and more widely used, security and privacy problem of RFID has not been completely solved. In most RFID authentication protocols, the search volume of the server depends on the number of tags. A light-weight RFID protocol is proposed based on M-sequence. In the proposed protocol, the search volume of the server does not depend on the number of tags. Based on the pseudo-randomness of M-sequeuce and the unidirectionality of hash function,the proposed protocol can resist replay attack,statistical analysis,spoofing attack,privacy track and so on.
作者 徐鹏翱 滕济凯 马鸿洋 Xu Pengao;Teng Jikai;Ma Hongyang(School of Science,Qingdao University of Technology,Qingdao,Shandong 26603)
出处 《信息安全研究》 2018年第6期555-558,共4页 Journal of Information Security Research
基金 国家自然科学基金项目(11547035)
关键词 RFID认证协议 安全 搜索量 HASH函数 M序列 RFID authentication protocol security search volume hash function M-sequence
  • 相关文献

参考文献3

二级参考文献46

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Burrows M A,Needham R.A Logic of Authentication [J].ACM Transactions on Computer Systems,1990,8(1):18-36.
  • 3Ohkubo M,Suzuki K, Kinoshita S. Cryptographic Approach to Privacy-Friendly" Tags [C]//Proc. of RFID Privacy Workshop,USA MIT, 2003.
  • 4Sarma S.E.,Weis S.A.,Engels D.W..Radio frequency identification:Secure risks and challenges [J].RSA Laboratories Cryptobytes, 2003,6(1):2-9.
  • 5LIM J, OH H, KIM S. A new hash-based RFID mutual authentica- tion protocol providing enhanced user privacy protection [ C]//Pro- ceedings of the 4th Information Security Practice and Experience Conference, LNCS 4991. Berlin: Springer-Verlag, 2008: 278- 289.
  • 6CHO J S, YEO S S, KIM S K. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value [ J]. Computer Communications, 2011, 34(3) : 391 - 397.
  • 7RYU E K, TAKAGI T. A hybrid approach for privacy-preserving RFID tags [ J]. Computer Standards and Interfaces, 2009, 31 (4) : 812 -815.
  • 8ZHOU S J, ZHANG Z, LUO Z W, et al. A lightweight anti-desyn- chronization RFID authentication protocol [ J]. Information Systems Frontiers, 2010, 12(5) : 521 -528.
  • 9DUC DN, KIM K. Defending RFID authentication protocols against DoS attacks [ J]. Computer Communications, 2011, 34(3) : 384 - 390.
  • 10van LE T, BURMESTER M, de MEDEIROS B. Universally com- posable and forward secure RFID authentication and authenticated key exchange [ C]//Proceedings of the 2nd ACM Symposium on In- formation, Computer and Communications Security. New York: ACM Press, 2007:242-252.

共引文献223

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部