期刊文献+

对ARAP认证协议的攻击及其改进 被引量:3

An Analysis and Improvement of ARAP Authentication Protocol
原文传递
导出
摘要 分析了射频识别(RFID)系统中匿名RFID认证协议(ARAP)存在的安全缺陷,指出攻击者可利用该协议存在的异或运算使用不当的安全缺陷发起身份假冒攻击.为此,提出了一种改进的RFID双向认证协议,该协议修改了ARAP认证协议中部分异或运算和验证操作,仍采用假名机制提供隐私性保护,防止攻击者对标签进行跟踪.结果分析表明,改进后的协议具有双向认证、前向安全性和匿名性等安全属性,并能够抵抗冒充、跟踪和重放等攻击.同时,性能对比分析表明改进后的协议具有比较好的效率,实用性较强. A radio frequency identification (RFID) authentication protocol anonymous RFID authentication protocol (ARAP) protocol is analyzed. It is proved that ARAP protocol is vulnerable to impersonating attacks. An im proved RFID mutual authentication protocol is proposed in this paper. Security analysis shows that the improved protocol can achieve mutual and anonymous authentication. The improved protocol is also resistant to impersonating attacks, tracking attacks and replay attacks. Moreover, comparing with other protocols, the improved protocol is more efficient.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2012年第6期526-530,共5页 Journal of Wuhan University:Natural Science Edition
基金 河南省基础与前沿技术研究计划项目(122300410123) 郑州市科技攻关项目(10PTGG340-4)资助
关键词 射频识别 安全协议 身份认证 HASH函数 radio frequency identification (RFID) cryptographic protocol authentication Hash function
  • 相关文献

参考文献10

二级参考文献100

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:103
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 4Feldhofer M. Comparison of low-power implementations of Trivium and Grain//Proceedings of the Workshop on the State of the Art of Stream Ciphers (SASC 2007). Bochum, Germany, 2007:236-246. 被引量:1
  • 5Feldhofer M, Wolkerstorfer J. Strong crypto for RFID tags--A comparison of low-power hardware implementations//Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 2007). New Orleans, USA, 2007, 27-30. 被引量:1
  • 6Haitner I, Reingold O, Vadhan S. Efficiency improvements in constructing pseudorandom generator from any one-way function//Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC 2010). Cambridge, USA, 2010: 437-446. 被引量:1
  • 7Juels A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394. 被引量:1
  • 8Juels A, Pappu R, Parno B. Unidirectional key distribution across time and space with applications to RFID security// Proceedings of the 17th USENIX Security Symposium. San Jose, Canada, 2008:75-90. 被引量:1
  • 9Molnar D, Wagner D. Privacy and security in library RFID.. Issues, practices, and arehitectures//Proceedings of the Conference on Computer and Communications Security (ACM CCS'04). Washington, USA, 2004:210-219. 被引量:1
  • 10Li Y, Ding X. Protecting RFID communications in supply chains//Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS' 07). Singapore, Singapore, 2007: 234-241. 被引量:1

共引文献397

同被引文献23

  • 1王张宜,李波,张焕国.Hash函数的安全性研究[J].计算机工程与应用,2005,41(12):18-19. 被引量:26
  • 2SARMA S E, WEIS S A,ENGELS D W. RFID systems and security and privacy implications[ C]//Proceedings of the 4th In-ternational Workshop on Cryptographic Hardware and Embedded Systems. New York: Springer-Verlag, 2002 : 454-469. 被引量:1
  • 3WEIS S A, SARMA S E, RIVEST R L, et al. Security and privacy aspects of low-cost radio frequency identification sys-tems[ J]. Security in Pervasive Computing, 2004, 28(2) :201-212. 被引量:1
  • 4OHKUBO M,SUZUKI K, KINOSHITA S. Hash-chain based forward-secure privacy protection scheme for low-cost RFID[C]//Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004). Berlin: Springec Verlag,2004:719-724. 被引量:1
  • 5SHEN J, CHOI D, MOH S, et al. A novel anonymous RFID authentication protocol providing strong privacy and security[C ]//Proceedings 2010 International Conference on Multimedia Information Networking and Security. Nanjing: AcnPress, 2010: 584-588. 被引量:1
  • 6RHEE K, KWAK J, KIM S,et al. Challenge-response based RFID authentication protocol for distributed database envi-ronment [C ] //Proceedings of the 2nd International Conference on Security in Pervasive Computing ( SPC 2005 ) . LecturesNotes in Computer Science 3450. Berlin : Springer-Verlag, 2005 : 70-84. 被引量:1
  • 7BURRROWS M,ABADI M, NEEDHAM R. A logic of authentication [ J]. ACM Transactions on Computer Systems,1990,8(1) :18-36. 被引量:1
  • 8WANG D,MA C G,GU D L, et al. Cryptanalysis of two dynamic ID-Based remote user authentication schemes for multi-server architecture [ J]. Lecture Notes in Computer Science, 2012,7645:462*475. 被引量:1
  • 9SARMA S E, WEIS S A, ENGELS D W RFID systems and security and privacy impficatJons[C].llProceedings of the 4th international Workshop on CryptographJc Hardware and Embedded Systems, New York: Springer-Verlag, 2002:454-469. 被引量:1
  • 10WEIS S A, SARMA S E, RIVEST R L, et aL Security and privacy aspecls of ow-cost radio frequency identification systems[J]. Security in Pervasive Computing, 2004, 28(2):201-212. 被引量:1

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部