期刊文献+

基于Rabin算法的可扩展RFID双向认证协议 被引量:1

Scalable RFID mutual authentication protocol based on Rabin algorithm
下载PDF
导出
摘要 针对现有的无线射频识别(RFID)安全认证协议存在安全缺陷、标签成本较高以及后台数据库需要进行大量的计算来搜索匹配符合要求的标签信息来进行认证等问题,提出了一种基于Rabin算法和交叉位运算的可扩展RFID双向认证协议。并基于BAN逻辑形式化分析方法,证明了该协议的正确性与安全性。安全分析和性能评估表明该协议不仅具有防假冒、防重放、防跟踪、可扩展性等特点,而且减少了标签的计算花费和门电路数,使得其成本大大降低,适用于低成本的RFID系统。 Aiming at the problems of the existing Radio Frequency Identification(RFID)security authentication protocol,such as security flaws, high cost of tags and identification which requires a lot of calculation of database to match requested tag, this paper offers a scalable RFID mutual authentication protocol based on Rabin algorithm and crossover bitwise operation.The correctness and security of the protocol are proved through BAN logic formal analysis method. Security analysis and performance evaluation shows that this protocol has features of anti-counterfeiting, anti-replay, anti-tracking and extendibility. And it reduces the cost of computation and gates, which reduces the cost greatly. It applies to low-cost RFID system.
作者 柳毅 杨领 杨育斌 LIU Yi;YANG Ling;YANG Yubin(School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China;School of Computer Science and Engineering, South China University of Technology, Guangzhou 510006, China)
出处 《计算机工程与应用》 CSCD 北大核心 2017年第2期15-20,共6页 Computer Engineering and Applications
基金 国家自然科学基金(No.61572144) 广东省自然科学基金(No.2014A030313517) 广东省科技计划项目(No.2016B090918125 No.2015B010128014)
关键词 无线射频识别 双向认证 Rabin算法 BAN逻辑 可扩展性 Radio Frequency Identification(RFID) mutual authentication Rabin algorithm BAN logic scalability
  • 相关文献

参考文献6

二级参考文献63

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2Juels A, Weis S A. Authenticating pervasive devices with human protocols [G] //I.NCS 3621: Proc of Advances in Cryptology CRYPTO 2005. Berlin.. Springer, 2005:293-308.
  • 3Song B, Mitchell C J. REID authentication protocol for low cost tags [C] //Proc of ACM Conf on Wireless Network Security WiSec'08. New York: ACM, 2008:140-147.
  • 4Molnar D, Soppera A, Wagner D. A scalable, delegatable pseudonym protocol enabling ownership transfer of RF1D tags [G] //LNCS 3897: Proc of Selected Areas in Cryptography SAC 2005. Berlin: Springer, 2005: 276-290.
  • 5Saito J, Imamoto K, Sakurai K. Reassignment scheme of an RFID tags key for owner transfer [G]//LNCS 3823 : Proc of Embedded and Ubiquitous Computing EUC 2005 Workshoos. Berlin, SDrinuer, 2005, 1303-1312.
  • 6Osaka K, Takagi T, Yamazaki K, et al. An efficient and secure RFID security method with ownership transfer [G] // LNCS 4456: Proc of Computational Intelligence and Security CIS 2006. Berlin: Springer, 2006:778-787.
  • 7Fouladgar S, Afifi H. An efficient delegation and transfer of ownership protocol for RFID tags[C] //Proc of the 1st Int EURASIP Workshop on RFID Technology. Piseataway, NJ IEEE, 2007: 10-14.
  • 8Jappinen P, Hamalainen H. Enhanced RFID security method with ownership transfer [C]//Proc of 2008 Int Conf on Computational Intelligence and Security. Piseataway, NJ: IEEE, 2008: 382-385.
  • 9Song B. RFID tag ownership transfer [C/OL]/Proc of the Confon RFID Security. 2008. [2011-04-01]. http://event. iaik. tugraz, at/RFIDSecOS/Papers.
  • 10Kulseng L, Yu Zhen, Wei Yawen, et al. Lighteweight mutual authentication and ownership transfer for REID systems [C]//Proc of the 29th Conf on Computer Communications-IEEE INFOCOM 2010. Piscataway, NJ: IEEE, 2010: 1-5.

共引文献83

同被引文献15

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部