期刊文献+

基于Hash函数的RFID双向认证协议

Hash-based RFID Mutual Authentication Protocol
下载PDF
导出
摘要 随着物联网技术的发展,射频识别技术被应用在多种领域。针对射频识别系统存在用户隐私泄露、认证耗时等问题,提出了一种轻量级基于Hash函数的RFID双向认证协议,实现了阅读器和标签,阅读器和数据库之间的双向认证。该协议利用Hash函数的单向性和秘钥动态生成的方法,克服了已有协议的不足。最后通过BAN逻辑分析方法形式化证明改进协议的安全性。 With the development of Internet of Things technology, radio frequency identification technology is applied to variousfields. Aiming at the problems of leakage of user privacy and time-consuming authentication in radio frequency identification sys-tems, a lightweight mutual authentication protocol for RFID based on Hash function is proposed, which realizes mutual authentica-tion between reader and tag, reader and database. The protocol uses the one-way nature of Hash functions and the dynamic genera-tion of secret keys to overcome the shortcomings of existing protocols. Lastly, the security of the protocol is improved by formal anal-ysis of BAN logic.
出处 《电脑知识与技术》 2018年第5Z期12-13,26,共3页 Computer Knowledge and Technology
基金 广东省青年创新人才类项目(编号:2017KQNCX235)
关键词 射频识别 HASH函数 BAN逻辑 双向认证 radio frequency identification(RFID) Hash function BAN logic mutual authentication
  • 相关文献

参考文献6

二级参考文献84

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3Feldhofer M. Comparison of low-power implementations of Trivium and Grain//Proceedings of the Workshop on the State of the Art of Stream Ciphers (SASC 2007). Bochum, Germany, 2007:236-246.
  • 4Feldhofer M, Wolkerstorfer J. Strong crypto for RFID tags--A comparison of low-power hardware implementations//Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 2007). New Orleans, USA, 2007, 27-30.
  • 5Haitner I, Reingold O, Vadhan S. Efficiency improvements in constructing pseudorandom generator from any one-way function//Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC 2010). Cambridge, USA, 2010: 437-446.
  • 6Juels A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394.
  • 7Juels A, Pappu R, Parno B. Unidirectional key distribution across time and space with applications to RFID security// Proceedings of the 17th USENIX Security Symposium. San Jose, Canada, 2008:75-90.
  • 8Molnar D, Wagner D. Privacy and security in library RFID.. Issues, practices, and arehitectures//Proceedings of the Conference on Computer and Communications Security (ACM CCS'04). Washington, USA, 2004:210-219.
  • 9Li Y, Ding X. Protecting RFID communications in supply chains//Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS' 07). Singapore, Singapore, 2007: 234-241.
  • 10Ma C, Li Y, Deng R, Li T. RFID privacy.. Relation between two notions, minimal condition, and efficient construction// Proceedings of the 16th ACM Conference on Computer and Communications Security (ACM CCS- 09). Chicago, USA, 2009, 54-65.

共引文献118

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部