期刊文献+

针对NFC点对点模式的传输认证改进方案

Improved scheme for the transmission and authentication of the NFC peer to peer mode
在线阅读 下载PDF
导出
摘要 为完善目前NFC点对点模式的漏洞,设计出一套全新的传输认证协议。采用着色Petri网进行理论建模,查找并论证安全风险的存在。通过融合多种已有的优秀算法,结合设备实际,给出全新的加密及认证方法,生成基于近场通信协议栈的安全隧道,并从算法复杂度的角度分析改进后协议的安全性。新协议能够抵御针对近场通信的多种攻击方式,稳健运行的同时更有着良好的应用前景,在安全上予以更高层次的保证,真正实现"碰一碰"即可完成交互的目标。 To plug the holes in the NFC peer to peer mode,this paper designs a new protocol for the transmission and authentication. The paper uses the simulation of the CPN which can find and demonstrate the existence of security risks to make theoretical modeling. Through combining several existing excellent algorithms with the practical facilities,it can give out a completely new encryption and authentication method which can develop a security tunnel based on NFC protocol stack. It also analyses the security of the improved protocol from the perspective of the complexity of the algorithm. The new protocol can be well resistant to many attack modes of NFC,executing stably and having good prospect.It can also grant a guarantee of higher level, truly realizing the goal of interactivity just through'touching'.
作者 邹佳伟 金志刚 马莹莹 ZOU Jia-wei;JIN Zhi-gang;MA Ying-ying(School of Computer Software,Tianjin University,Tianjin 300072 ,China;School of Electronic and Information Engineering,Tianjin University,Tianjin 300072 ,C hina)
出处 《信息技术》 2016年第12期147-151,155,共6页 Information Technology
关键词 NFC 点对点模式 着色PETRI网 数据加密 可信认证 near lield communication ( NFC ) peer to peer mode colored Petri net (CPN) data encryption trusted authentication
  • 相关文献

参考文献4

二级参考文献38

  • 1彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 2张世永.网络信息安全[M],北京科学出版社,2003.
  • 3M Burrows,M Abadi,R M Needham.A logic of authentication[R].Research report 39,digital systems research center.February 1989.In:proceedings of the Royal Society of London A,1989,426:233-271.
  • 4B B Nieh,S E Tavares.Modelling and analyzing cryptographic protocols using Petri nets[C]// Advances in Cryptology2AUSCRYPT'92.vol2ume 718 of LNCS,Springer2Verlag,1992:275-295.
  • 5D dolev.On the security of public key protocols[J].IEEE Transactions on Information Theory,1983,29(2):198-208.
  • 6Marrero W,Clarke E,Jha S.A model checker for authentication protocols[C]// In:DIMACS Workshop on Design and Formal Verification of Security Protocols,1997.
  • 7HeeChul Moon.A study on formal specification and analysis of cryptographic protocols using Colored Petri Nets[D].Korea:Kwangju institute of science and echnology,1998.
  • 8蒋昌俊,Petri网的行为理论及其应用[M].北京:高等教育出版社,2002.
  • 9NFC Forum. NFC digital protocol technical specification 1.0[S].2010.
  • 10NFC Forum, NFC Data Exchange Format (NDEF) technical specification 1.0[S].2006.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部