期刊文献+

基于循环组的RFID安全认证协议

Security Mutual Authentication Protocol of Radio-Frequency Identification Based on Cyclic Group
下载PDF
导出
摘要 针对射频识别(RFID)系统存在的信息隐私和安全问题,分析典型的RFID安全认证协议及其劣势,提出了基于循环组的RFID系统相互认证协议。该协议不在标签侧执行伪随机函数,而是执行简单的异或和取模运算,并基于匿名集和信息泄漏度量标签受攻击时分析系统的隐私性能和安全级别。与常见认证协议相比,所提出的协议具备运算效率高、内存需求低等优势。性能分析和仿真实验表明,该协议能够抵抗重放、异步和中间人等典型攻击,与其它认证协议相比具有更强的安全性和更好的隐私保护能力,并能满足RFID标签低成本的要求。 Aiming at the problems of privacy and security in radio-frequency identification(RFID)system, we analyzed the typical RFID security and privacy authentication protocol and their disadvantages, and then proposed a mutual authentication protocol based on the cyclic group for RFID system. Rather than execute the pseudo-random function on the tag side, our protocol is based on simple module and exclusive OR operations. Additionally, it measures the privacy protection ability and security level based on the anonymous set and information leakage. Compared with existing authentication protocol, the proposed protocol has the advantages of high computational efficiency and lower memory requirements. Results of simulation experiments show that our protocol has good performance insecurity and privacy protection. It can handle many typical attacks effectively, such as replay, asynchronous and man-in-the-middle, etc. Furthermore, it can satisfy the low-cost requirement of RFID tags.
作者 张腾达 董辉 ZHANG Tengda;DONG Hui(Anhui Vocational College of Press and Publishing,Hefei 230601,China;Vocational and Technical College,Bouzhou 236800,China)
出处 《武汉工程大学学报》 CAS 2019年第5期504-510,共7页 Journal of Wuhan Institute of Technology
基金 安徽省高校自然科学研究重点项目(KJ2018A0887,KJ2016A493) 安徽省亳州市产业创新团队项目(亳组[2015]20号-2)
关键词 射频识别 循环组 安全隐私 认证协议 radio-frequency identification(RFID) cyclic group security and privacy authentication protocol
  • 相关文献

参考文献10

二级参考文献55

  • 1韩团军.基于射频技术的无线识别系统设计[J].电子技术(上海),2010(8):24-26. 被引量:3
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 4高吉祥,王晓鹏,宋克慧.全国大学生电子设计竞赛培训系列教程:2007年全国大学生电子设计竞赛试题剖析[M].北京:电子工业出版社,2009.
  • 5SArma S E,Weis S A,Engels D W. RFID Systems and Security and Privacy Implications I C ]//Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems. Berlin, Germany: Springer, 2003 : 454 469.
  • 6Sarma S E,Weis S A, Engels D W. Radio Frequency Identification: Secure Risks and Challenges [ J ~. RSA Laboratories Cryptobytes ,2003,6 ( 1 ) :2-9.
  • 7Weis S A,Sarma S E, Rivest R L, et al. Security and Privacy Aspects of Low Cost Radio Frequency Identification Systems I C ]//Proceedings of the 1st International Conference on Security in Pervasive Computing. Berlin, Germany : Springer, 2004,201-212.
  • 8Ohkubo M, Suzuki K, Kinoshita S. Hash-chain Based Forward-secure Privacy Protection Scheme for Low-cost RFID I C ]//Proceedings of Symposium on Cryptography and Information Security. Berlin, Germany: Springer, 2004:719-724.
  • 9Henrici D, Muller P. Hash-based Enhancement of Location Privacy for Radio-frequency Identification Devices Using Varying Identifiers ~ C ~//Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications. Washington D. C., USA :IEEE Press ,2004 : 149-153.
  • 10Lee S M, Hwang Y J, Lee D H, et al. Efficient Authentication for Low Cost RFID Systems ~ C 1// Proceedings of International Conference on Computa- tional Science and Its Applications. Berlin, Germany: Springer, 2005 : 619-627.

共引文献79

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部