期刊文献+

基于低成本标签的RFID匿名双向认证协议 被引量:5

Anonymous bidirectional RFID authentication protocol based on low-cost tags
在线阅读 下载PDF
导出
摘要 为消除目前现有低成本无线射频识别(RFID)认证协议存在的各种安全隐患,解决认证协议所忽视的针对后端数据库的拒绝服务攻击问题,使用简单的逻辑运算以及读写器的屏蔽操作,以两个16位循环冗余校验(CRC)函数消息的级联作为标签与读写器相互认证因子,设计了一种新的基于低成本标签的RFID匿名双向认证协议,并对其进行了性能分析。分析结果表明,所提协议能够抵抗重放攻击和同步攻击,具备不可追踪性、真实性和服务的可用性,是一个比较安全、高效、实用的RFID低功耗安全认证方案。 To remove hidden risks and solve neglected Denial-of-Service(DoS) attacks in the back-end database in current low-cost Radio Frequency Identification(RFID) authentication protocols,a new anonymous bidirectional RFID authentication protocol based on low-cost tags was proposed,and the performance analysis was conducted.According to the simple operative logic and shielded operation of reader,this scheme was designed by utilizing two cascading 16 bit Cyclic Redundancy Check(CRC) messages as mutual authentication factor between the label and the reader.The analytical results show the proposed protocol possesses untraceability,authenticity and usability and resists replaying attack and synchronization attack.Overall,it is a RFID low-power security authentication scheme of security,efficiency and practicality.
作者 胡韬 魏国珩
出处 《计算机应用》 CSCD 北大核心 2012年第1期111-114,130,共5页 journal of Computer Applications
关键词 低成本标签 无线射频识别 安全协议 认证 动态密钥 low-cost tag Radio Frequency Identification(RFID) security protocol authentication dynamic key
  • 相关文献

参考文献9

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 2赵跃华,王益维,李晓聪.一种适合于低成本标签的RFID双向认证协议[J].计算机应用研究,2010,27(5):1885-1888. 被引量:7
  • 3张志强.啤酒酿造技术概要[M].北京:中国轻工业出版社,1996..
  • 4PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, ESTEVEZ-TAPIADOR J M, et al. Cryptanalysis of a novel authentication protocol conforming to EPC-C1 G2 standard [J]. Computer Standards and Interfaces, 2009, 31(2): 372-380.
  • 5HAN D, KWON D. Vulnerability of an RFID authentication protocol conforming to EPC Class-1 Generation-2 standards [ J]. Computer Standards and Interfaces, 2009, 31(4):648-652.
  • 6van LE T, MIKE BURNMESTER, BRENO DE MEDEIROS. Universally composable and forward-secure RFID authentication and authenticated key exchange [ C]// Proceedings of the Second ACM Symposium on Information. Computer and Communications Security. New York: ACM Press, 2007:242 -252.
  • 7DUC D N, KIM K. Defending RFID authentication protocol against DoS attacks [J]. Computer Communications, 2011, 34(3): 384-390.
  • 8AVOINE G. Adversarial model for radio frequency identification [ EB/OL]. (2005-01-01) [2010-05-15]. http://eprint, iacr. org.
  • 9聂鹏.EPCglobal Class 1 Gen 2标准的RFID高效双向认证协议[J].计算机工程与应用,2011,47(10):92-94. 被引量:6

二级参考文献50

  • 1KARTHIKEYAN S,NESTERENKO M.RFID security without extensive cryptography[C]// Proc of ACM Workshop on Security of Ad hoc and Sensor Networks.Alexandria,VA:ACM,2005:63-67.
  • 2EPCTM Radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860MHz~960MHz version 1.0.9[S].2005.
  • 3DUC D N,PARK J,LEE H,et al.Enhancing security of EPCglobal GEN-2 RFID tag against traceability and cloning[C]// Proc of Symposium on Cryptography and Information Security.2006.
  • 4CHIEN H Y,CHEN C H.Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards[J].Computer Standards & Interfaces,2007,29(2):254-259.
  • 5PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,TAPIADOR,et al.Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard[J].Computer Standards & Interfaces,2009,31(2):372-380.
  • 6KONIDALA D M,KIM K.Auto-ID labs white paper WP-HARDWARE033,RFID tag-reader mutual authentication scheme utilizing tag's access password[S].2007.
  • 7LIM T L,LI T.Addressing the weakness in a lightweight RFID tag-reader mutual authentication scheme[C]// Proc of IEEE Int'l Global Telecommunications Conference(GLOBECOM).2007:59-63.
  • 8KONIDALA D M,KIM Z,KIM K.A simple and cost-effective RFID tag-reader mutual authentication scheme[C]// Proc of RFIDSec.2007:141-152.
  • 9PERIS-LOPEZ P,LI Tie-yan,LIM T-Lee,et al.Vulnerability analysis of a mutual authentication scheme under the EPC Class-1 Generation-2 Standard[C]// Proc of RFIDsec.2008:9-11.
  • 10CHIEN H Y.SASI:a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity[J].IEEE Trans on Dependable and Secure Computing,2007,4(4):337-340.

共引文献226

同被引文献49

  • 1孙剑斌.基于RFID技术的物流管理系统[J].中国管理信息化(综合版),2006,9(5):34-35. 被引量:9
  • 2徐小双,关治洪.基于混沌映射的交互式零知识证明身份认证协议[J].计算机工程与应用,2005,41(4):156-157. 被引量:2
  • 3李泳生,邹雪城,刘冬生,杨秋平.一种RFID标签芯片数字部分状态机的设计[J].电子技术应用,2006,32(2):114-116. 被引量:5
  • 4张挺,熊璋,王剑昆,方义.一个面向低功耗设计的RFID系统研究与实现[J].小型微型计算机系统,2006,27(11):2090-2093. 被引量:16
  • 5Thornton F,Haines B,Das A M.RFID security[M].[S.1.] : Syn- gress Pulishing,Inc,2007.
  • 6Chien Hung-Yu, Chen Chehao.Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards[J]. Computer Standards & Interfaces,2007,29(2) :254-259.
  • 7Dimitriou T.A lightweight RFID protocol to protect against traceability and cloning attacks[C]//The First International Conference on Security and Privacy for Emerging Areas in Communications Networks.Washington:IEEE Computer Society, 2005 : 59-66.
  • 8Godor G, Antal M, Imre S.Mutual authentication protocol for low computational capacity RFID systems[C]//Global Tele- communications Conference, 2008 : 1-5.
  • 9Godor G, Imre S.Security analysis of the simple lightweight authentication protocol[C]//Ninth International Conference on Digital Object Identifier,2010:231-236.
  • 10Tolruul B, Lee K.An advanced mutual-authentication algo- rithm using AES for RFID systems[J].Intemational Journal of Computer Science and Network Security,2006,6(9).

引证文献5

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部