期刊文献+

适用于低成本标签的移动RFID认证协议 被引量:3

Mobile RFID authentication protocol for low-cost tags
在线阅读 下载PDF
导出
摘要 移动RFID系统中,阅读器与服务器之间的通道安全假设不再成立,针对这种情况,分析了当前移动RFID认证协议的安全及性能问题,建立了移动RFID安全隐私模型;基于该模型,在兼容EPC Class-1 Generation-2低成本标签系统的基础上,提出了一种能够抵抗假冒攻击、去同步化攻击,且提供前向安全隐私保护的双向认证协议;通过安全性证明与性能比较分析,表明该协议达到了设计目的,可适用于较大规模的低成本标签移动RFID系统。 In the mobile RFID system,the channel between reader and server is usually insecure,therefore the security and performance of current mobile RFID authentication protocol is analyzed.The mobile RFID security privacy model is established.Based on the model,a mutual authentication protocol,which can resist impersonation attack and desynchronization attack,as well as provide the forward secrecy protection,is proposed.It is compatible with EPC Class-1 Generation-2 low-cost tag system.Security proof and performance analysis show that the protocol not only achieves the designing purpose,but also can be applied to the large scale mobile RFID system with low-cost tag.
作者 苏彬 程玲 崔宝江 SU Bin;CHENG Ling;CUI Baojiang(School of Cyberspace Security,Beijing University of Posts and Telecommunications,Beijing 100876,China;Department of Computer Engineering,Xinjiang Institute of Engineering,Urumuqi 830091,China;Department of Computer Engineering,Shanxi Polytechnic College,Taiyuan 030006,China)
出处 《计算机工程与应用》 CSCD 北大核心 2018年第16期68-75,共8页 Computer Engineering and Applications
基金 国家自然科学基金联合基金项目(No.U1536122)
关键词 移动RFID 安全模型 认证协议 低成本标签 双向认证 mobile RFID security model authentication protocol low-cost tag mutual authentication
  • 相关文献

参考文献7

二级参考文献42

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Chien H.Y.A new ultraligh weight RFID authentication protocol providing strong authentication and strong integrity[].IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING.2007
  • 3Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J,Ribagorda A.LMAP:Areal lightweight mutual authentica-tion protocol for low-cost RFID tags[].Proceedings of the Printed Handout of Workshop on RFID Security—RFIDSec.2006
  • 4Woo-Sik B. Formal Verification of an RFID Authentication Proto-col Based on Hash Function and Secret Code[j]. Wireless Person-al Communications, 2014,79(4) :2595-2609.
  • 5Zhou J. A Quadratic Residue-Based Lightweight RFID Mutual Au-thentication Protocol with Constant-Time Identification [J]. Jour-nal of Communications,2015,10(2).
  • 6Liu Z,Liu D, Li L,et al. Implementation of a New RFID Authenti-cation Protocol for EPC Gen2 Standard [J], Sensors Journal,IEEE,2015,15(2):1003-1011.
  • 7Gope P,Hwang T, A Realistic Lightweight Authentication Proto-col Preserving Strong Anonymity for Securing RFID System [J].Computers & Security (2015). http://dx.doi.org/10.1016/jxose.2015.05.004.
  • 8Bagheri N, Saflchani M, Peris- Lopez P, et al. Weaknesses in aNew Ultralightweight RFID Authentication Protocol with Permuta-tion- RAPP [j]. Security and Communication Networks, 2014,7(6):945-949.
  • 9Jin C,Xu C, Zhang X, et al. A Secure RFID Mutual Authentica-tion Protocol for Healthcare Environments Using Elliptic CurveCryptography [ J ]. Journal of medical systems ,2015,39(3) : 1-8.
  • 10Khan G N,Moessner M. Low-Cost Authentication Protocol for Pas-sive, Computation Capable RFID Tags [j]. Wireless Networks,2015,21(2):565-580.

共引文献50

同被引文献7

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部