期刊文献+

UHF RFID标签的伪随机数发生器研究 被引量:1

Research on PRNG Suitable for UHF RFID Tag
在线阅读 下载PDF
导出
摘要 随着物联网的普及,RFID的应用也越来越广泛,对其安全性的研究是近几年的热点。由于成本和计算资源的限制,EPC1类2代(C1G2)无源标签中的安全部件只有随机数发生器和CRC。低复杂性随机数发生器的设计对于C1G2标签的安全是非常关键的。提出一种适于硬件实现的简单哈希函数M-hash,并利用M-hash的单向性设计了一种伪随机数发生器M-PRNG。M-PRNG以LFSR为核心器件,结构简单,适用于C1G2标签等无源器件。经过验证,M-PRNG所产生的随机序列完全符合C1G2协议的要求,并成功通过了NIST测试。 With the development of Internet of Things, the application of RFID is becoming more and more prevalent. The security of RFID has been a hot topic in recent years. Due to the limitation of cost and power consumption, the se- curity components in EPC Class 1 Generation 2(C1G2) passive tags are only random number generator (RNG) and Cy- clic Redundancy Code (CRC). The design of RING with low hardware complexity is critical to the security of C1G2 tag. A simple hash function, named M-hash, which is suitable to be realized in hardware was proposed. Furthermore, a pseu- do-random number generator M-PRNG was designed based on one-wayness of M-hash. The M-PRNG is based on LFSR and has low hardware complexity which is suitable to passive devices like CIG2 tag. It is proved that the random se- quences generated by the M-PRNG are fully compatible with EPC C1G2 protocol and successfully passe the most de- manding randomness test NIST.
出处 《计算机科学》 CSCD 北大核心 2013年第7期102-106,共5页 Computer Science
基金 山东省科技攻关项目(2009GG10001007)资助
关键词 伪随机数发生器 哈希函数 射频识别 EPC1类2代 Pseudo-random number generator, Hash function, RFID, EPC C1G2
  • 相关文献

参考文献16

  • 1EPCglobal Inc. Class 1 Generation 2 UHF RFID protocol for communication at 860Mhz-960Mhz version 1.0. 9.
  • 2Ranasinghe D, Engels D, Cole P. Low-cost RFID systems: Con-fronting security and privacy [ C ]// Auto-ID Labs Research Workshop. 2004.
  • 3Che W,Deng H, Tan X, et al. A Random Number Generator for Application in RFID Tags[M]. Networked RFID Systems and Lightweight Cryptography, Chapter 16, Springer, 2008: 279-287.
  • 4Melia-Segui J, Garcia-Alfaro J, Herrera-Joaneomarti J. Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags[C]//Sion R, Curtmola R, Dietrich S, eds. RL- CPS,WECSR, and WLC 2010. LNCS, vol. 6054, Springer, Hei- delberg, 2010 34-46.
  • 5Jonan M-S,Joqauin G-A,Jorid H-J. A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags[J]. Wireless Personal Communications, 2011, 59(1).
  • 6Pillai V, Heinrich H. An ultra-low-power long range battery / passive RFID tag for UHF and microwave bands with a current consumption of 700 nA at 1.5V[J]. IEEE Transactions on Cir- cuits and Systems I Regular Papers, 2007,54(7):1500-1512.
  • 7Peris-Lopez P, Hernandez-Castro J, Estevez-Tapiador J, et al. LAMED——A PRNG for EPC class-1 generation-2 RFID specifi- cation[J]. Computer Standards Interfaces, 2009,31 (1) : 88-97.
  • 8Menezes A,van Oorschot P, Vanstone S. Handbook of Applied Cryptography[M]. CRC Press, 19 9 6.
  • 9Goldreich O, Krawczyk H, Luby M. On the existence of pseudo- random generators[C]fflEEE symposium on the foundations of computer science,29th SFCS. 1988:12-24.
  • 10Huang A L, Penzhorn W T. Cryptographic hash functions and low power techniques for embedded hardware[C]//Proceedings of the IEEE International Symposium on Industrial Electronics, 2005. ISlE 2005. Vol. 4s,2005:1789-1794.

二级参考文献36

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170

共引文献92

同被引文献18

  • 1Lu Y, Wu Z, Gao Z M. The Research of Intelligent Storage System Based on UHF RFID [M]// Advanced Technologies, Embedded and Multimedia for Human-centric Computing. Netherlands: Springer, 2014: 655-661.
  • 2Wu H, Zeng Y, Feng J, et al. Binary tree slotted ALOHA for passive RFID tag anticollision [J]. IEEE Transactions on Parallel and Distributed Systems (S1045-9219), 2013, 24(1): 19-31.
  • 3Zhang Lijuan, Zhang Jin, Tang Xiaohu. Assigned Tree Slotted Aloha RFID Tag Anti-Collision Protocols [J]. IEEE Transactions on Wireless Communications (S1536-1276),.2013, 12(11): 5493-5505.
  • 4Zhenpeng L, Zhenyang G, Kaiyu S, et al. Anti-collision Algorithm for RFID Based on Continuous Collision Detection [J]. TELKOMNIKA Indonesian Journal of Electrical Engineering (S1693-6930), 2013, 11(12): 7476-7483.
  • 5Sawada H, Araki S, Makino S. Underdetermined convolutive blind source separation via frequency bin-wise clustering and permutation alignment [J]. IEEE Transactions on Audio, Speech, and Language Processing, (S1558-7916), 2011, 19(3): 516-527.
  • 6Deville Y, Deville A. Quantum-Source Independent Component Analysis and Related Statistical Blind Qbit Uncoupling Methods [M]// Blind Source Separation. Germany: Springer Berlin Heidelberg, 2014: 3-37.
  • 7Gillis N, Luce R. Robust Near-Separable Nonnegative Matrix Factorization Using Linear Optimization [J]. Journal of Machine Learning Research (S1532-4435), 2014, 15(4): 1249-1280.
  • 8Zhou C~ Xie S, Yang Z, et al. Minimum-volume- constrained nonnegative matrix factorization: Enhanced ability of learning parts [J]. IEEE Transactions on Neural Networks (S1045-9227), 2011, 22(10): 1626-1637.
  • 9Gomez J C, Moens M F. Minimizer of the Reconstruction Error for multi-class document categorization [J]. Expert Systems with Applications (S0957-4174), 2014, 41(3): 861-868.
  • 10熊廷文,谈熙,闫娜,闵昊.基于超高频RFID的实时定位系统的建模与仿真(英文)[J].系统仿真学报,2011,23(1):212-216. 被引量:12

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部