期刊文献+

基于射频识别的安全认证协议设计 被引量:3

Design of Secure Authentication Protocol Based on Radio Frequency Identification
在线阅读 下载PDF
导出
摘要 随着射频识别技术的广泛应用,其引发的安全问题和计算开销之间的矛盾愈发突出。为此,研究主流射频识别安全认证协议存在的安全缺陷,分析其计算开销,设计一种安全性高、计算成本低的安全认证协议。通过串空间模型方法对协议进行分析,得出协议可以安全可靠地实现读写器与标签的双向认证。分析结果表明,该协议能够抵抗假冒、窃听、重放、类型缺陷和位置跟踪等攻击,具有较好的前向安全性,且运算开销小,适用于各种低成本的射频识别系统。 With the extensive application of Radio Frequency Identification( RFID),the contradiction between its security and computation is serious. On this background,the security defects and cost of the main RFID secure authentication protocols are analyzed. On this basis,a newauthentication protocol is promoted with higher security and lower cost. Its security is verified via the strand space model,which proves that the mutual authentication of reader and tag can be realized safety and reliability. The analysis results showthat the protocol is resistible to attacks such as spoofing attack,eavesdrop attack,replay attack,type flawattack,tracking and so on,and also provides perfect forward secrecy,which has a lower computation,and is suitable for low-cost RFID system.
作者 李翠 石林
出处 《计算机工程》 CAS CSCD 北大核心 2016年第3期172-176,共5页 Computer Engineering
基金 国家自然科学基金资助项目(61403417)
关键词 物联网 射频识别 认证协议 串空间模型 安全性分析 Internet of Things(IoT) Radio Frequency Identification(RFID) authentication protocol strand space model safety analysis
  • 相关文献

参考文献13

  • 1李志清.物联网安全问题研究[J].网络安全技术与应用,2011(10):33-35. 被引量:13
  • 2SArma S E,Weis S A,Engels D W. RFID Systems and Security and Privacy Implications I C ]//Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems. Berlin, Germany: Springer, 2003 : 454 469.
  • 3Sarma S E,Weis S A, Engels D W. Radio Frequency Identification: Secure Risks and Challenges [ J ~. RSA Laboratories Cryptobytes ,2003,6 ( 1 ) :2-9.
  • 4Weis S A,Sarma S E, Rivest R L, et al. Security and Privacy Aspects of Low Cost Radio Frequency Identification Systems I C ]//Proceedings of the 1st International Conference on Security in Pervasive Computing. Berlin, Germany : Springer, 2004,201-212.
  • 5王晓华.RFID系统的安全问题及其解决方案[J].物流技术,2008,27(1):110-116. 被引量:7
  • 6Ohkubo M, Suzuki K, Kinoshita S. Hash-chain Based Forward-secure Privacy Protection Scheme for Low-cost RFID I C ]//Proceedings of Symposium on Cryptography and Information Security. Berlin, Germany: Springer, 2004:719-724.
  • 7Henrici D, Muller P. Hash-based Enhancement of Location Privacy for Radio-frequency Identification Devices Using Varying Identifiers ~ C ~//Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications. Washington D. C., USA :IEEE Press ,2004 : 149-153.
  • 8Lee S M, Hwang Y J, Lee D H, et al. Efficient Authentication for Low Cost RFID Systems ~ C 1// Proceedings of International Conference on Computa- tional Science and Its Applications. Berlin, Germany: Springer, 2005 : 619-627.
  • 9Molnar D,Wagner D. Privacy and Security in Library RFID: Issues, Practices, and Architectures [ C 1// Proceedings of the 1 lth ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2004 : 210-219.
  • 10Wang Bangju, Zhang Huanguo, Wang Zhangyi, et al. A Secure Mutual Password Authentication Scheme with User Anonymity [ J 1. Geometrics and Information Science of Wuhan University ,2008,33 (10) : 1073-1075.

二级参考文献60

  • 1鞠伟成,俞承芳.一种基于动态二进制的RFID抗冲突算法[J].复旦学报(自然科学版),2005,44(1):46-50. 被引量:42
  • 2郭俐,王喜成.射频识别(RFID)系统安全对策技术研究的概述[J].网络安全技术与应用,2005(9):23-25. 被引量:11
  • 3陈欣,郎为民,王建秋,杨宗凯.射频识别技术安全问题[J].电子技术(上海),2006,33(4):37-40. 被引量:12
  • 4International Telecommunication Union.The Intemet of Things[R].ITU Report.2005.
  • 5WEBER R H.Intem et of Things-New security and privacy challenges[J]. Computer Law & Security Review.2010.
  • 6LEUSSE P, PERIORELLIS ED1M ITRAKOST, et al Self Managed Security Cell,a security model for the lntemet of Things and Services[C].Proc of the 2009 First International Conference on Advances in Future Intemet.Piscataway: IEEE.2009.
  • 7MULL IGANG. The Intemet of Things:Here Now and Coming Soon[J].Intemet Computing.2010.
  • 8HAMAD F, SMALOV L,JAMES A.Energy-aw are security in commerce and the Internet of Things[J].IETE.Technical review.2009.
  • 9Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID Tags[C] //Proc. of the 2nd Workshop on RFID Security. [S. l.] : IEEE Press, 2006.
  • 10Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. EMAP: An Efficient Mutual Authentication Protocol for Low-cost RFID Tags[C] //Proc. of IS’06. [S. l.] : Springer-Verlag, 2006: 352-361.

共引文献28

同被引文献25

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部