期刊文献+

一种改进的RFID双向安全认证协议

An improved RFID mutual authentication protocol
在线阅读 下载PDF
导出
摘要 现有的RFID认证协议大部分都建立在阅读器和后台数据库为安全通信这一假设上,通过对现有协议以及RFID发展趋势的分析,取消这种假设,提出了一种改进的双向安全认证协议.该协议采用异或运算和Hash函数对通信的消息进行加密,通过自动更新标签ID、共享密钥等方法抵抗重放攻击、假冒攻击、系统内部攻击等.性能分析表明,新协议能在较低成本的基础上抵抗各种攻击,可以保证通信的安全性和正确性. Most of the existing authentication protocols are based on the assumption that the communication between the reader and the background database is safe .Through the analysis of the existing protocols and the development trend of RFID ,we cancellthis assumption and propose a new improved mutual authentication pro-tocol .It uses the XOR operation and Hash algorithm to encrypt the messages .Through updating the ID of the tag automatically and sharing the keys ,it resists the replay attack ,counterfeit attack ,internal system attack and so on .The performance analysis shows that this protocol can resist all kinds of attacks and guarantee the security and correctness of the communication on the basis of low cost .
作者 王彦 李永珍
出处 《延边大学学报(自然科学版)》 CAS 2014年第1期58-62,共5页 Journal of Yanbian University(Natural Science Edition)
关键词 双向认证 安全协议 会话密钥 RFID RFID mutual authentication secure protocol session key
  • 相关文献

参考文献5

  • 1潘涛,左开中,郭良敏,罗永龙.基于异或运算的低成本RFID双向认证协议[J].计算机工程,2012,38(9):278-281. 被引量:7
  • 2He Jialiang, Xu Zhiqiang. A mutual RFID security protocol for wireless reader[J]. International Jour nal of Security and Its Applications, 2013,7(5):43- 52.
  • 3Sandhya M, Rangaswamy T R. A Practical Ap- proach for Enhancing Security in Mobile RFID En- vironment [C]//2011 International Conference on Future Information Technology ICFIT 2011. Singa-pore, 2011.
  • 4朱炜玲,喻建平.物联网移动RFID系统隐私保护方案[J].系统工程理论与实践,2011,31(S2):119-123. 被引量:5
  • 5He Jialiang, Ouyang Dantong, Xu Youjun, et al. An efficient RFID authentication protocol support- ing tag ownership transfer[J]. International Journal of Advancements in Computing Technology, 2012, 4(4) :244-253.

二级参考文献19

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 2Ari J.RFID Security and Privacy:A Research Survey[J].IEEEJournal on Selected Areas in Communications,2006,24(2):381-394.
  • 3Weis S A,Sarma S E,Rivest R L,et al.Security and PrivacyAspects of Low-cost Radio Frequency Identification Systems[C]//Proc.of the 1st Security in Pervasive Computing.Berlin,Germany:Springer-Verlag,2003.
  • 4Ohkubo M,Suzuki K,Kinoshita S.Hash-chain Based Forward-secure Privacy Protection Scheme for Low-cost RFID[C]//Proc.ofSymposium on Cryptography and Information Security.Sendai,China:[s.n.],2004.
  • 5Molnar D,Wagner D.Privacy and Security in Library RFID:Issues,Practices,and Architectures[C]//Proc.of the 11th ACMConference on Computer and Communications Security.Washington D.C.,USA:[s.n.],2004.
  • 6Lee S M,Hwang Y J,Lee D H,et al.Efficient Authentication forLow-cost RFID Systems[C]//Proc.of International Conference onComputational Science and Its Applications.Berlin,Germany:Springer-Verlag,2005.
  • 7Wang Hua,Sun Lili,Yong Jianming,et al.Privacy Preserving onRadio Frequency Identification Systems[C]//Proc.of the 13thInternational Conference on Computer Supported CooperativeWork in Design.Santiago,Chile:[s.n.],2009.
  • 8Bao Guihao,Zhang Minggao,Liu Jiuwen,et al.The Design of anRFID Security Protocol Based on RSA Signature forE-ticket[C]//Proc.of the 2nd IEEE International Conference onInformation Management and Engineering.Chengdu,China:[s.n.],2010.
  • 9Chen Chih-Yung,Kuo Chien-Ping,Chien Fang-Yuan.An Ex-ploration of RFID Information Security and Privacy[C]//Proc.ofJoint Conferences on Pervasive Computing.[S.l.]:IEEE Press,2009.
  • 10Li Yongzhen,Jeong Y S.Low-cost Authentication Protocol of theRFID System Using Partial ID[C]//Proc.of Conference on Com-putational Intelligence and Security.Guangzhou,China:[s.n.],2006.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部