期刊文献+

一种增强型RFID双向认证协议 被引量:1

An Enhanced Mutual Authentication Protocol for RFID
下载PDF
导出
摘要 RFID系统的安全性问题一直是研究者们关注的热门话题。针对RFID认证协议,研究者们提出的方案各有千秋,比如基于Hash函数的方法易实现,基于密钥的方法更安全。论文对一种基于非对称密钥和Hash函数的RFID认证协议进行了分析与改进。改进后的协议安全性更高,能够抵抗多种非法攻击,更有实用价值。最后,文章用BAN逻辑分析方法形式化验证了改进协议的安全性。 The security of RFID system has always been a hot topic for researchers.For the RFID authentication protocol,the solutions proposed by the researchers have their own advantages.For example,the method based on Hash function is easy to imple ment,and the key-based method is more secure.This paper analyzes and improves an RFID authentication protocol based on asym metric keys and Hash function.And the improved protocol has high security and practicability with resisting many kings of attacks.Finally,the article formal analyzes the security of improved protocol by using BAN logic.
作者 刘立波 郑巧珍 付强 LIU Libo;ZHENG Qiaozhen;FU Qiang(No.722 Research Institute,China Shipbuilding Industry Group Co.,Ltd.,Wuhan 430079)
出处 《舰船电子工程》 2019年第10期96-100,105,共6页 Ship Electronic Engineering
关键词 RFID认证协议 非对称密钥 HASH函数 RFID authentication protocol asymmetric keys Hash function
  • 相关文献

参考文献10

二级参考文献108

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:104
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3Yao Jun Zeng Guihua.Enhanced NTRU cryptosystem eliminating decryption failures[J].Journal of Systems Engineering and Electronics,2006,17(4):890-895. 被引量:3
  • 4Dimitriou T.A lightweight RFID protocol to protect against traceability and cloning attacks[C] //Secure Comm:Conference on Security and Privacy for Emerging Areas in Communication Networks.Athens,Greece:IEEE Press,2005:59-66.
  • 5Song B,Mitchell C J.RFID authentication protocol for low-cost tags[C] //Proceedings of the 1st ACM Conference on Wireless Network Security,Alexandria,Virginia,USA.ACM Press,2008:140-147.
  • 6Chien Hung-yu,Chen Che-hao.Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards[J].Computer Standards & Interfaces,2007,29(2):254-259.
  • 7Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.Cryptanalysis of a novel authentication protocol conforming to EPCC1G2 standard[J].Computer Standards & Interfaces,2009,31(2):372-380.
  • 8Kang S Y,Lee D G,Lee I Y.A study on secure RFID mutual authentication scheme in pervasive computing environment tJ].Computer Communications,2008,31(18):4248-4254.
  • 9Kaya S V,Sava E.Public key cryptography based privacy preserving multi-context RFID infrastructure[J].Ad Hoc Networks,2009,7(1):136-152.
  • 10Paise R I,Vaudenay S.Mutual authentication in RFID:Security and privacy[C] //Proceedings of the 2008 ACM Symposium on Information,Computer and Communications Security 2008,Tokyo,Japan.ACM Press,2008:292-299.

共引文献163

同被引文献10

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部