期刊文献+

基于PUF的高效低成本RFID认证协议 被引量:12

Low-cost RFID authentication protocol based on PUF
在线阅读 下载PDF
导出
摘要 已提出的针对低成本RFID系统的安全机制,要么存在安全缺陷,要么硬件成本太高。为此设计了一个基于物理不可克隆功能(PUF)的RFID安全认证协议,利用PUF和线性反馈移位寄存器(LFSR)实现了阅读器和标签之间强的安全认证,解决了已有安全协议存在的问题。安全性分析表明:该协议成本低、安全性高,能够抵抗物理攻击和标签克隆,并有极强的隐私性。 The available security mechanisms for the low-cost Radio Frequency IDentification(RFID) systems are either defective or high-cost.Therefore,this paper proposed an efficient security authentication protocol for low-cost RFID system based on Physical Unclonable Function(PUF) and Linear Feedback Shift Register(LFSR).The protocol provides strong security and can resist physical attack and tag clone with strong privacy.
出处 《计算机应用》 CSCD 北大核心 2012年第3期683-685,698,共4页 journal of Computer Applications
基金 武汉市重点科技攻关计划项目(201150699190)
关键词 射频识别 安全认证协议 物理不可克隆功能 线性反馈移位寄存器 加密 Radio Frequency IDentification(RFID) security authentication protocol Physical Unclonable Function(PUF) Linear Feedback Shift Register(LFSR) encryption
  • 相关文献

参考文献15

  • 1JUELS A,WEIS S A.Authenticating pervasive devices with human protocols[C] // CRYPTO 2005:Proceedings of 25th Annual International Cryptology Conference,LNCS3621.Berlin:Springer-Verlag,2005:293-308.
  • 2SARMA S,WEIS S,ENGEIS D.Radio frequency identification:Secure risks and challenges[J].RSA Laboratories Cryptobytes,2003,6(1):2-9.
  • 3WEIS S A,SARMA S E,RIVEST R L,et al.Security and privacy aspects of low-cost radio frequency identification systems[C] //Proceedings of the 1 st International Conference on Security in Pervasive Computing,LNCS 2802.Berlin: Springer-Verlag,2004:201-212.
  • 4OHKUBO M,SUZUKI K,KINOSHITA S.Hash-chain based forward-secure privacy protection scheme for low-cost RFID[C] //SCIS 2004:Proceedings of the 2004 Symposium on Cryptography and Information Security.Berlin:Springer-Verlag,2004:719-724.
  • 5MOLNAR D,WAGNER D.Privacy and security in library RFID:Issues,practices,and architectures[C] // CCS'04:Proceedings of the 1th ACM Conference on Computer and Communications Security.New York:ACM Press,2004:210-219.
  • 6RHEE K,KWAK J,KIM S,et al.Challenge-response based RFID authentication protocol for distributed database environment[C] //SPC 2005:Proceedings of the 2nd International Conference on Security in Pervasive Computing,LNCS 3450.Berlin:Springer-Verlag,2005:70-84.
  • 7丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592. 被引量:93
  • 8CHIEN H Y.SASI:A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity[J].IEEE Transactions on Dependable and Secure Computing,2007,4(4):337-340.
  • 9YUKSEL K. Universal hashing for ultra-low-power cryptographic hardware applications[D].Worcester:Worcester Polytechnic Institute,Electrical & Computer Engineering Department,2004.
  • 10FELDHOFER M,DOMINIKUS S,WOLKERSTORFER J.Strong authentication for RFID systems using the AES algorithm[C] //Proceedings of CHES.New York:ACM Press,2004:85-140.

二级参考文献42

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170

共引文献99

同被引文献74

引证文献12

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部