期刊文献+

轻量级的无线射频识别安全认证协议 被引量:5

Lightweight security authentication protocol for radio frequency identification
在线阅读 下载PDF
导出
摘要 针对现有无线射频识别(RFID)认证协议存在的安全缺陷,提出了一种新的轻量级RFID安全认证协议,并基于GNY逻辑给出了形式化证明。协议采用阅读器双重认证及预认证阶段刷新密钥的方法,通过在标签中添加保护密钥同步的恶意攻击标记Tm,解决了当前协议中存在的可扩展性欠佳、标签密钥更新失败导致位置跟踪和非法更新标签/服务器内部密钥造成拒绝服务(DoS)等问题,可抵抗重传、标签/阅读器假冒和通信量分析等多种恶意攻击,尤其防范来自位置隐私泄露和拒绝服务的安全威胁。分析结果表明,所提协议具有低成本、安全性高、计算复杂度低等特点,适合于标签数目较多的RFID系统。 With regard to the security vulnerabilities of the existing Radio Frequency Identification(RFID) authentication protocols,a new lightweight security protocol for RFID was proposed.The formal proof of the correctness of the proposed authentication protocol was given based on GNY logic.The proposed scheme adopted the method of reader dual-authentication and key refreshing during reader pre-authentication phase,which achieved the anti-desynchronization requirement by adding flag Tm of malicious attacks into the tag.The protocol solved the security and privacy problems of poor scalability,location tracking due to failure of renewing the key of tag,and Denial of Service(DoS) resulting from illegal updating inner keys of tag/server in the existed schemes.It efficiently resisted several possible attacks including replay,tag/reader impersonation,traffic analysis,location tracking and desynchronization.The analytical results show that the proposed protocol is of low-cost,good security and limited computational complexity,which fits for RFID system when the tags number is large.
作者 张顺 陈海进
出处 《计算机应用》 CSCD 北大核心 2012年第7期2010-2014,共5页 journal of Computer Applications
基金 江苏省交通厅基金资助项目(09X12) 江苏省普通高校研究生科研创新计划项目(CXZZ11_0638) 南通大学研究生科技创新计划项目(YKC11059)
关键词 无线射频识别 隐私保护 认证协议 可扩展性 GNY逻辑 Radio Frequency Identification(RFID) privacy preserving authentication protocol scalability GNY logic
  • 相关文献

参考文献14

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2LIM J, OH H, KIM S. A new hash-based RFID mutual authentica- tion protocol providing enhanced user privacy protection [ C]//Pro- ceedings of the 4th Information Security Practice and Experience Conference, LNCS 4991. Berlin: Springer-Verlag, 2008: 278- 289.
  • 3CHO J S, YEO S S, KIM S K. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value [ J]. Computer Communications, 2011, 34(3) : 391 - 397.
  • 4RYU E K, TAKAGI T. A hybrid approach for privacy-preserving RFID tags [ J]. Computer Standards and Interfaces, 2009, 31 (4) : 812 -815.
  • 5ZHOU S J, ZHANG Z, LUO Z W, et al. A lightweight anti-desyn- chronization RFID authentication protocol [ J]. Information Systems Frontiers, 2010, 12(5) : 521 -528.
  • 6DUC DN, KIM K. Defending RFID authentication protocols against DoS attacks [ J]. Computer Communications, 2011, 34(3) : 384 - 390.
  • 7van LE T, BURMESTER M, de MEDEIROS B. Universally com- posable and forward secure RFID authentication and authenticated key exchange [ C]//Proceedings of the 2nd ACM Symposium on In- formation, Computer and Communications Security. New York: ACM Press, 2007:242-252.
  • 8YOON E J. Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard [ J]. Expert Systems with Ap- plications, 2012, 39(1) : 1589 - 1594.
  • 9YEH T C, WANG Y J, KUO T C, et al. Securing RFID systems conforming to EPC Class 1 Generation 2 standard [ J]. Expert Sys- tems with Applications, 2010, 37(12): 7678-7683.
  • 10SONG B, MITCHELL C J. Scalable RFID security protocols sup- porting tag ownership transfer [ J]. Computer Communications, 2011, 34(4): 556-566.

二级参考文献64

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170

共引文献268

同被引文献33

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2赵克文,寇卫东,肖玉霞.基于分级思想的射频识别技术安全认证过程的研究[J].电子科技,2006,19(8):7-11. 被引量:1
  • 3许毅,陈建军.RFID原理与应用[M].北京:清华大学出版社,2013.
  • 4JUELS A. RFID security and privacy: A research survey[ J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) : 381 - 394.
  • 5SARMA S E, WEI S A, ENGELS D W. Radio frequency identifica- tion: Secure risks and challenges [ J]. RSA Laboratories Crypto bytes, 2003, 6(1):2-9.
  • 6WEI S A, SARMA S E, RIVEST R L, et al. Security and privacy aspects of low-cost radio frequency identification systems [ C]//Se- curity in Pervasive Computing, LNCS 2802. Heidelberg: Springer Berlin, 2004:201 -212.
  • 7OHKUBO M, SUZUKI K, KINOSHITA S. Hash-chain based forward- secure privacy protection scheme for low-cost RFID [ C]//Proceed- ings of the 2004 Symposium on Cryptography and Information Securi- ty. Berlin: Springer-Verlag, 2004:719-724.
  • 8ZHANG Y, GUO H. An improved RFID privacy protection scheme based on Hash-chain [ C]// Proceedings of the 2010 International Conference on Logistics Engineering and Intelligent Transportation Systems. New York: IEEE Press, 2010:1 -4.
  • 9DIMITRIOU T. A lightweight RFID protocol to protect against traceability and cloning attacks [ C ]// Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks. Washington, DC: IEEE Computer Society, 2005:59 -66.
  • 10ZhangYan,YangLaurenceT,ChenJiming.RFID与传感器网络:架构、协议、安全与集成[M].北京:机械工业出版社.2012.

引证文献5

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部