期刊文献+

基于PUF的抗物理克隆RFID安全认证协议 被引量:5

PUF-based Anti-physical Cloning RFID Security Authentication Protocol
下载PDF
导出
摘要 安全认证协议是解决射频识别(RFID)系统前向信道安全和身份识别问题的重要手段。针对RFID系统标签和读写器通信信道安全性较低以及低成本RFID系统标签容易受到物理攻击和标签克隆攻击的问题,基于物理不可克隆函数(PUF)技术和传统的RFID安全认证协议,文章提出一种基于PUF的抗物理克隆RFID安全认证协议。通过PUF和哈希函数两种密码原语来保证通信安全,协议的所有通信都经过加密,从而保证信息的隐私性和安全性,每一轮认证后更新标签信息和密钥信息从而防止重放攻击。协议性能分析结果表明,文章所提出的安全认证协议不仅能够防范窃听、篡改、重放等攻击,还能够防范物理攻击和标签克隆攻击,提高了RFID系统的安全性;同时不会占用过多资源,能够适用于低成本的资源受限的RFID系统。 Security authentication protocol is an important means to solve the forward channel security and identity identification problems of radio frequency identification(RFID)system.In view of the insecure problem of RFID system tags and reader channels and the vulnerability of tags to physical attacks,combining physical unclonable function(PUF)technology with traditional RFID security protocol,a PUF-based anti-physical cloning RFID protocol is proposed.The communication primitives are guaranteed by the two cryptographic primitives PUF and hash function,all communication of the protocol is encrypted to ensure the exclusiveness and security of the information,and the label information and the key information are updated after each round of authentication.The analysis results of protocol performance show that,the proposed protocol can prevent not only eavesdropping,tampering,replay attacks,but also physical attacks and tag clone attacks,thus improving the security of RFID system.At the same time,the proposed protocol does not take up too much resources and can be applied to low-cost resource-constrained RFID systems.
作者 王利 李二霞 纪宇晨 李小勇 WANG Li;LI Erxia;JI Yuchen;LI Xiaoyong(China Electric Power Research Institute Corporation,Beijing 100192,China;Key Laboratory of Trustworthy Distributed Computing and Service(BUPT),Ministry of Education,Beijing University of Posts and Telecommunications,Beijing 100876,China)
出处 《信息网络安全》 CSCD 北大核心 2020年第8期89-97,共9页 Netinfo Security
基金 国家电网有限公司科技项目[PDB17201800158] 国家自然科学基金-通用技术基础研究联合基金[U1836215]。
关键词 RFID系统 安全认证协议 抗物理克隆 物理不可克隆函数 RFID system security authentication protocol resistance to physical cloning physical unclonable function
  • 相关文献

参考文献3

二级参考文献18

  • 1Chuan-fu Z, Jiang Y, Wan-zhong S, et al. Internet Key Exchange Protocol Simulation of HAIPE in Securi- ty Network[C]//International Conference on Cyber- Enabled Distributed Computing and Knowledge Discov- ery. IEEE,2010:250-253.
  • 2Rao M C. A Fixed Network Transmission Based on Kerberos Authentication Protocol [J]. International Journal of Engineering, 2013,2(11).
  • 3Mundra P, Shukla S, Sharma M, et al. Modeling and Verification of Kerberos Protocol using Symbolic Model Verifier[C]//International Conference on Communica- tion Systems and Network Technologies. IEEE, 2011: 651-654.
  • 4Abdelmajid N T, Hossain M A, Shepherd S, et al. Location-Based Kerberos Authentication Protocol[C]// IEEE Second International Conference on Social Com- puting. IEEE,2010:1099-1104.
  • 5Abdelmajid N T, Hossain M A, Shepherd S, et at. Improved Kerberos security protocol evaluation using modified BAN logic [C]//IEEE 10th International Conference on Computer and Information Technology. IEEE,2010:1610-1615.
  • 6Butler F, Cervesato I, Jaggard A D, et al. Formal a- nalysis of Kerberos 5[J]. Theoretical Computer Sci- ence,2006,367(1) :57-87.
  • 7Mathuria A M, Safavi-Naini R, Nickolas P R. On the automation of GNY logic[J]. Australian Computer Science Communications, 1995,17:370-379.
  • 8Cohen M, Dam M. A completeness result for BAN logic[J]. Prococeedings of Methods for Modalities, 2005,4.
  • 9吴昌,肖美华.基于SPIN的IKEv2协议高效模型检测[J].计算机工程与应用,2008,44(5):158-161. 被引量:5
  • 10王威,胡铭曾,张兆心.基于串空间理论的Kerberos协议安全性分析[J].高技术通讯,2008,18(9):909-914. 被引量:1

共引文献17

同被引文献24

引证文献5

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部