期刊文献+

基于物理不可克隆函数的RFID双向认证 被引量:14

RFID Mutual Authentication Based on Physical Unclonable Function
在线阅读 下载PDF
导出
摘要 在物联网应用中,基于传统加密手段的无线射频识别(RFID)认证协议计算量较大,在资源有限的设备中不具有可操作性。为解决该问题,提出一种基于物理不可克隆函数的RFID双向认证协议。分析RFID系统协议的安全需求,根据物理不可克隆函数设计轻量级的双向安全认证协议,利用形式化分析语言证明协议的安全性。分析结果表明,与随机化Hash-Lock、轻量级认证协议等相比,该协议不仅能够有效防止假冒、重放、追踪攻击,也能抵抗物理克隆攻击。 Traditional encryption-based Radio Frequency Identification(RFlD) authentication protocols require a large amount of computation in the application of Intenlet of Thing(IOT), therefore it can not be adopted to the resource-limited devices. In order to solve this problem, this paper proposes a RFID mutual authentication protocol based on Physical Unclonable Function(PUF). This paper analyzes the security requirements of the RFID system protocol. According to the PUF, it designs a lightweight two-way security authentication protocol, and uses tbrrnal language to prove the security of the protocol. Analysis results show that this protocol can not only prevent lack, track, replay attacks, but also protect against physical clonable attacks, compared with the randomized Hash-Lock, a lightweight authentication protocol etc..
出处 《计算机工程》 CAS CSCD 2013年第6期142-145,共4页 Computer Engineering
基金 河南省科技创新人才基金资助项目(104100510025)
关键词 物理不可克隆函数 无线射频识别 认证协议 物联网 形式化分析 防篡改 Physical Unclonable Function(PUF) Radio Frequency ldentification(RFID) authentication protocol Internet ofThing(IOT) formal analysis tamper-proofing
  • 相关文献

参考文献11

二级参考文献84

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 2蔡庆玲,詹宜巨,史斌宁.一种符合EPC C1G2标准的RFID随机化密钥双向认证协议[J].电信科学,2007,23(4):70-74. 被引量:4
  • 3International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 4Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 5Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 6Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 7Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 8Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 9Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 10Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140

共引文献296

同被引文献66

引证文献14

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部