期刊文献+

PUF-HB#:轻量级RFID双向认证协议 被引量:9

PUF-HB#: a Lightweight RFID Mutual Authentication Protocol
原文传递
导出
摘要 为了实现对低成本标签的认证和隐私保护,提出了轻量级无线射频识别(RFID)双向认证协议.利用HB#协议通信量和存储量较小的特性,结合物理不可克隆函数防止标签被克隆,认证结束后进行密钥更新防范位置追踪.分析结果表明,该协议实现了标签与阅读器间的双向认证,不仅具有HB#协议的安全特性,还具有抵抗克隆攻击、内存读取攻击、保护隐私安全等特性,同时可以减轻阅读器搜索密钥的负担. In order to authenticate low-cost tag and protect its privacy, a lightweight radio frequency i- dentification mutual-authentication protocol is proposed. The proposed protocol takes advantage of HB# protocol with small amount of transmission and storage, combines with physically unclonable function to protect the tag from cloning, and updates the keys to prevent location tracking. Analysis shows that it re- alizes mutual-authentication between the reader and the tag, and not only inherits the security properties of HB# protocol, but also can resist clone attack, read memory attack and protect privacy. At the same time, the proposed protocol can also substantially reduce the reader's burden on searching keys.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2013年第6期13-17,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(61070207)
关键词 无线射频识别 轻量级 物理不可克隆函数 双向认证 radio frequency identification lightweight physically unclonable function mutual-authentication
  • 相关文献

参考文献1

二级参考文献10

  • 1龙士工,罗文俊,袁超伟,李祥.串空间模型中的口令猜测攻击[J].北京邮电大学学报,2007,30(1):62-65. 被引量:3
  • 2Juels A. RFID security and privacy: a research survey [J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) : 381-394.
  • 3Le T V, Burmester M, Medeiros B. Universally composable and forward secure RFID authentication and authenticated key exchange [ C ] Jj ASIACCS'07. New York: ACM Press, 2007: 242-252.
  • 4Cao T J, Bertino E. Security analysis of the SASI protocol [J]. IEEE Transactions on Dependable and Secure Computing, 2009, 6(1): 73-77.
  • 5Song B, Mitchell J C. RFID authentication protocol for low-cost tags [ C ] //WiSec'08. New York: ACM Press, 2008 : 140-147.
  • 6Chien H Y, Huang C W. Security of uhra-lightweight RFID authentication protocols and its improvements [ J ]. ACM Operating System Review, 2007, 41 (2) : 83-86.
  • 7Thayer F, Herzog J C, Guttman J D. Strand spaces: proving security protocols correct [ J]. Journal of Computer Security, 1999, 7(2): 191-230.
  • 8Garcia F D, Hasuo I, Pieters W, et al. Provable anonymity[ C] ///FMSE. Virginia: IEEE Press, 2005: 63- 72.
  • 9Feldhofer M, Dominikus S, Wolkerstorfer J. Strong authentication for RFID systems using the AES algorithm [ C ] //CHES'04. Berlin: Springer-Verlag, 2004 : 357- 370.
  • 10Ouafi K, Phan R. Traceable privacy of recent provablysecure RFID protocols [ C ] // ACNS'08. New York: ACM Press, 2008: 479-489.

共引文献5

同被引文献54

  • 1王宇博.基于Matlab的数字滤波器降噪的探究[J].信息通信,2019,0(11):33-35. 被引量:5
  • 2陈兵,郑嘉琦.轻型的RFID安全认证协议LAP[J].通信学报,2013,34(S1):1-7. 被引量:1
  • 3周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 4高锐.一种基于空间分割的无源RFID室内定位方法[J].计算机应用研究,2012,29(1):185-186.
  • 5DEHKORDI M H,FARZANEH Y.Improvement of the hash-based RFID mutual authentication protocol[J]. Wireless personal communications, 2014,75 (1) : 219-232.
  • 6CHUANG Y H,TSENG Y M, LEI C L.Efficient mutual authentication and key agreement with used anonymity for roaming services in global mobility networks[J].International Journal of Innovative Computing Information & Control, 2012,8(9) : 6415-6427.
  • 7Alomair B, Clark A, Cuellar J, et al. Scalable RFID systems: a privacy-preserving protocol with constant-time identification [ J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23 (8) : 1536-1550.
  • 8Chen Yalin, Chou Juesam, Sun Hungmin. A novel mutu-al authentication scheme based on quadratic residues for RFID systems [ J]. Computer Networks, 2003, 52(12) : 2373-2380.
  • 9Yeh T C, Wu Chienhung, Tseng Y M. Improvement of the RFID authentication scheme based on quadratic resi- duesIJ]. Computer Communications, 2011, 34 (3): 337-341.
  • 10Chou Juesam. A constant-time identifying large-scale RFID tags using lines on a plane [ J]. Transactions on e- merging telecommunications technologies, 2014, 25 (11): 1083.

引证文献9

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部