期刊文献+

基于动态ID带搜索密钥的RFID认证协议

RFID Authentication Protocol Based on Dynamic ID with a Search-Key
在线阅读 下载PDF
导出
摘要 针对射频识别(RFID)认证协议安全性较差的问题,设计一个基于动态ID带搜索密钥的RFID认证协议。标签利用单向hash函数的部分输出更新搜索密钥和ID。分析表明,该协议能够有效地实现标签与阅读器之间的相互认证,同时能够抵抗包含前向安全、后向安全、位置跟踪在内的多种攻击,而且硬件需求不高,适合低成本标签使用。 Aiming at the security problem of Radio Frequency Identification authentication protocol, proposes an efficient security protocol for low- cost RFID system based on dynamic ID with a search-key. Tag use of part of the output of the one-way function update the search key and ID. From the result, it can be seen that this protocol can provide authentication between tag and reader, moreover, can resist attacks contain forward traceability, backward traceability, and location tracking. From the implementation point, it just uses a one-way function, which reduces the computing complexity and makes it fitting for low-cost tags applications.
出处 《现代计算机》 2014年第8期7-10,共4页 Modern Computer
基金 广东省自然科学基金(No.S2012020011071)
关键词 射频识别 安全协议 动态ID 搜索密钥 Radio Frequency Identification(RFID) Security Protocol Dynamic ID Search-Key
  • 相关文献

参考文献12

  • 1Moessner M,Khan G N.Secure Authentication Scheme for Passive C1G2 RFID Tags[J].Computer Networks,2012,56 (1):272-286.
  • 2Lee Y C.Two Utralightweight Authentication Protocols for Low-Cost RFID Tags[J].Applied Mathematics & Information Sciences,2012,6(2):425-431.
  • 3S.E.Sarma,S.A.Weis,D W Engels.RFID Systems and Security and Privacy Implications[J].Lecture Notes in Computer Science,2003,2523:454-469.
  • 4Ohkubo M,Suzuki K,Kinoshita S.Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID[C].Proceedings of the 2004 Symposium on Cryptography and Information Security.Berlin,Germany:Springer,2004:719-724.
  • 5D Molnar,D.Wagner.Privacy and Security in Library RFID Issues,Practices,and Architectures[C].Proceedings of the 1 1th ACM Conference on Computer and Communications Security,Wyndham,USA:ACM Press,2004:210-219.
  • 6Lee S M,Hwang Y J,Lee D H,et al.Efficient Authentication for Low-cost RFID Systems[C].Proceedings of the International Conference on Computational Science and Its Applications.Berlin,Germany:Springer,2005:619-627.
  • 7P.D.Arco,A.D.Santis.On Ultra Lightweight RFID Authentication Protocols[J].IEEE Transactions on Dependable and Secure Computing,2011,Vol.8(4):548-563.
  • 8G.N.Khan,M.B.Moessner.Secure Authentication Protocol for RFID Systems[C].2011 Proceedings of 20th International Conference on Computer Communications and Networks(ICCCN),Toronto,USA:IEEE Press,2011:1-7.
  • 9张恒山,常军,管会生.基于混合加密方法的RFID安全认证协议[J].计算机工程,2011,37(1):134-136. 被引量:5
  • 10聂鹏.EPCglobal Class 1 Gen 2标准的RFID高效双向认证协议[J].计算机工程与应用,2011,47(10):92-94. 被引量:6

二级参考文献29

  • 1Juels A. RFID Security and Privacy: A Research Survey[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394.
  • 2Vajda I, Buttyan L. Light Weight Authentication Protocols for Low-cost RFID Tags[C]//Proc. of Workshop on Security in Ubiquitous Computing. Goteborg, Sweden: [s. n.], 2003.
  • 3Juels A. Minimalist Cryptography for Low-cost RFID Tags[C]//Proc. of the 4th International Conference on Security in Communication Networks. [S. l]: Springer Press, 2004: 149-164.
  • 4Peris-Lopez P, CHernandez-Castro J, Estevez-Tapiador J, et al. LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID Tags[C]//Proc. of the 2nd Workshop on RFID Security. [S. l.]: IEEE Press, 2006.
  • 5Barasz M, Boros B, Ligeti R et al. Breaking LMAP[C]//Proc. of RFIDSec'07. [S. l.]: IEEE Press, 2007:11-16.
  • 6Barasz M, Boros B, Ligeti P, et al. Passive Attack Against the M2AP Mutual Authentication Protocol for RFID Tags[C]//Proc. of the 1st International EURASIP Workshop on RFID Technology. [S. l.]: IEEE Press, 2007: 76-83.
  • 7Peris-Lopez P, CHernandez-Castro J, Estevez-Tapiador J, et al. An Ultra Light Authentication Protocol Resistant to Passive Attacks Under the Gen-2 Specification[J]. Journal of Information Science and Engineering, 2009, 25(2): 33-57.
  • 8Ngai E W T, Moon K K L. An Academic Literature Review (1995-2005) and Future Research Directions[J]. International Journal of Production Economics, 2008, 112(2): 510-520.
  • 9Chien Hung-Yu, Chen Che-Hao. Mutual Authentication Protocol for RFTD Conforming to EPC Class 1 Generation 2 Standards[J]. Computer Standards & Interfaces, 2007, 29(2): 254-259.
  • 10Kang S Y, Lee D G, Lee I Y. A Study on Secure RFID Mutual Authentication Scheme in Pervasive Computing Environment[J]. Computer Communications, 2008, 31 (18): 4248-4254.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部