期刊文献+

可证明安全的轻量级无服务型RFID安全搜索协议 被引量:2

Provable Security Lightweight Service-less RFID Security Search Protocol
在线阅读 下载PDF
导出
摘要 针对RFID标签搜索过程中产生的安全与隐私问题,设计了一个轻量级无服务型RFID安全搜索协议.通过严格时间戳的方式对移动读写器的时间权限进行管理,提出松散时间戳和HASH函数相结合的方式对无线信道进行安全防护,其利用HASH函数的单向性保证了协议消息的完整性和保密性,利用碰撞原理实现了可调节的隐私强度及搜索效率.在UC框架下证明了协议满足通用可组合安全性,使得协议可运行在并发环境当中,在标准安全模型下证明了协议满足抵抗重放、去同步、跟踪及匿名性等攻击方式,提出的搜索协议具有强安全性和强隐私性. To solve the problems of security and privacy caused by RFID tags search process, a light- weight service-less RFID security search protocol was designed. Firstly, through strict timestamp, the time permissions of the mobile reader were managed. Secondly, the method of combining loose timestamp and HASH function for the safety protection of the wireless channel was put forward, the one-way character of HASH function was used to ensure the integrity and confidentiality of interactive messages. Finally, the collision thought was made use of to realize the adjustable intensity of privacy and search efficiency. Under the UC framework, it was proved that the protocol could meet universally cornposable security, enabling the protocol to run in the concurrent environment. Under the standard security model, it was proved that the protocol could effectively resist replay attack, de-synchronization attack, track attack, anonymity attack and so on. It follows that the proposed protocol has strong security and privacy.
出处 《湖南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2014年第8期117-124,共8页 Journal of Hunan University:Natural Sciences
基金 国家重大基础研究发展计划(973计划)资助项目(2012CB724400) 国际科技合作专项资助项目(2013DFG72850)
关键词 无线射频识别(RFID) 搜索协议 通用可组合 标准安全模型 Radio Frequency Identification search protocol universally composable standard securitymodel
  • 相关文献

参考文献15

  • 1罗娟,汪云飞,李仁发,凌林.一种基于B+树的RFID抗冲突算法[J].湖南大学学报(自然科学版),2009,36(6):72-75. 被引量:1
  • 2CHIEN Hung-yu. SASI:a new ultra-lightweight RFID authen- tication protocol providing strong authentication and strong in- tegrity[J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4): 337-340.
  • 3LIAO Yi-pin, HSIAO Chih-ming. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer pro- tocol[J]. Ad Hoc Networks, 2013, http://dx, doi. org/10. 1016/j. adhoc. 2013.02. 004.
  • 4MASOUD H D,YOUSOF F. Improvement of the Hash-hased RFID mutual authentication protoeol [J]. Wireless Personal Communieatios, 2013, http://dx, doi. org/10. 1007/s11277- 013-1358-7.
  • 5YEH Tzu-chang, WU Chien-hung, TSENG Yun-min. Im- provement of the RFID authentieation scheme based on quad- ratic residues[J], Computer Communications, 2011, 34 (3) : 337-341.
  • 6TIAN Yun, CHEN Gong-liang, LI Jian-hua. A new ultra- lightweight RFID authentication protoeol with permutation [J]. IEEE Communications Letters, 2012, 16(5): 702-705.
  • 7GILDAS A, XAVIER C, BENJAMIN M. Privacy-friendly synchronized ultralightweight authentication protocols in the storm[J]. Journal of Network and Computer Applications, 2012, 35(2): 826-843.
  • 8Jiwhan Lim,Sangjin Kim,Heekuck Oh,Donghyun Kim.A Designated Query Protocol for Serverless Mobile RFID Systems with Reader and Tag Privacy[J].Tsinghua Science and Technology,2012,17(5):521-536. 被引量:4
  • 9LEE Chin-feng, CHIEN Hung-yu, LAIH Chi-sung. Server- less RFID authentication and searching protocol with enhanced security [J]. International Journal of Communication Systems, 2012, 25: 376-385.
  • 10TAN C C,BO S, LI Qun. Secure and serverless RFID authen- tication and search protocols [J]. IEEE Transactions on Wire- less Communications, 2008,7 (3) : 1400- 1407.

二级参考文献31

  • 1MYUNG J, LEE W, SRIVASTAVA J. Adaptive binary splitting for efficient RFID tag anti-coll/sion[J]. IEEE Communication Letters, 2006,10(3) : 144 - 146.
  • 2CHEN Wei-chih, HORNG Shi-jinn, FAN Ping-zhi. An enhanced anti-collision algorithm in RFID based on counter and stack[C]// Second International Conference on Systems and Networks Communications: 2007 : 117 - 120.
  • 3ZHANG Hong, HAN Lei, LI Yu-lu.Design of hash-tree anti-collision algorithm [ C ]//Third International Conference on Natural Computation, 2007: 24 - 27.
  • 4严蔚敏 吴伟民.数据结构[M].北京:清华大学出版社,1997..
  • 5Juels A. RFID security and privacy: A research survey. Journal of Selected Areas in Communication (J-SAC), 2006, 24(2): 381-395.
  • 6Chien H-Y. SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4): 337-340.
  • 7Bogdanov A, Leander G, Paar C, Poschmann A, Robshaw M, Seurin Y. Hash functions and RFID tags: Mind the gap. Lecture Notes in Computer Science, 2008, 5154: 283-299.
  • 8Juels A, Weis S A. Authenticating pervasive devices with human protocols. Lecture Notes in Computer Science, 2005, 3126: 293-308.
  • 9Feldhofer M, Dominikus S, Wolkerstorfer J. Strong authentication for RFID systems using the AES algorithm. Lecture Notes in Computer Science, 2004, 3156: 85-140.
  • 10Feldhofer M, Wolkerstorfer J. Strong crypto for RFID tags-A comparison of low-power hardware implementations. In: Proceedings of IEEE International Symposium on Circuits and Systems, 2007: 1839-1842.

共引文献10

同被引文献20

  • 1SAHAI A, WATERS B. Fuzzy identity-based encryption [C]//Proceeding of Advances in Cryptology-EUROCRYPT' 05. Aarhus: Springer Berlin Heidelberg, 2005:457-473.
  • 2SHAMIR A. Identity-based cryptography systems and signa- ture schemes[C]//Proceeding of Advances in Cryptology- CRYPTO' 84. Berlin : Springer Berlin Heidelberg, 1984 : 47 - 53.
  • 3BETHENCOURT J, SAHAI A, WATERS B. Ciphertext- policy attribute-based encryption [C]//Proceeding of IEEE Symposium Security and Privacy. Berkeley,CA:IEEE, 2007:321-334.
  • 4WATERS B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization[C]// Proceeding of PKC' 11. Taormina, Italy: Springer Berlin Heidelberg,2011 : 53-70.
  • 5GOYAL V, PANDEY O, SAHAI A,et al. Attribute-based encryption for flne-gralned access control of encrypted data [C]// Proceeding of ACM Conference on Computer and Communications Security. Virginia : ACM, 2006 : 89- 98.
  • 6HUR J, NOH D K. Attribute-based access control with effi- cient revocation in data outsourcing systems[J]. IEEE Trans- actions on Parallel and Distributed Systems, 2011,22 (7) : 1214-1221.
  • 7CHASE M. Multi-authority attribute based encryption[C]// Proceeding of Cryptography Conference on Theory of Cryp- tography(TCC' 07). Amsterdam: Springer Berlin Heidel- berg, 2007: 515-534.
  • 8LIN H, CAO Z F, LIANG X. Secure threshold multi-authori- ty attribute-based encryption without a central authority [C]//Proceeding of International Conference on Cryptology. India: Springer Berlin Heidelberg, 2008:426-436.
  • 9LEWKO A , WATERS B. Decentralizing attribute-based en- cryption[C]//Proceeding of International Conference on the Theory and Applications of Cryptographic Techniques. Tallinn.. Springer Berlin Heidelberg, 2011 : 568 - 588.
  • 10SUSHMITA R, MILOS S, AMIYA N. Privacy preserving ac cess control with authentication for securing data in clouds [C]// Proceeding of IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid). Ottawa: IEEE, 2012:556-563.

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部