期刊文献+

一种基于ECC口令认证的RFID认证协议

One RFID Authentication Protocol Based on ECC Password Authentication
下载PDF
导出
摘要 为了确保RFID系统中用户安全风险、隐私及数据安全,分析了相关RFID协议的安全性问题,利用椭圆曲线离散对数问题的难解性,结合一次性口令OTP,提出了一种基于ECC口令认证的RFID双向认证协议。该协议实现了密钥同步更新,读写器与标签、标签与服务器之间的双向认证,有效地抵抗了重放、伪装、流量分析及跟踪等攻击。协议能很好地保护用户的隐私和数据的安全,具有密钥长度短、计算量小及安全性高等特点。 In order to decrease user’s security risks,and ensure user’s privacy and data security in the RFID systems,Analysis of the security problems of RFID protocol,combined with the intractability of the elliptic curve discrete logarithm problem and one-time password OTP,RFID,a mutual authentication protocol is proposed based on ECC password authentication. The protocol realizes the key synchronization update,and the mutual authentication between the reader and tags,labels and the server,effectively resists the attacks from replay,masquerading,traffic analysis and tracking. The protocol can protect user privacy and data security,it has such advantages as short key length,small amount of calculation,and higher security.
作者 曹阳
出处 《电脑开发与应用》 2014年第5期37-39,共3页 Computer Development & Applications
基金 国家自然科学基金(21373132) 陕西省教育厅科研计划项目(12JK0946)
关键词 RFID 椭圆曲线离散对数问题 口令认证 ECC RFID ECC Radio Frequency Identification elliptic curve discrete logarithm problem password authentication elliptic curve cryptosystem
  • 相关文献

参考文献5

二级参考文献35

  • 1隋爱芬,杨义先,钮心忻,罗守山.基于椭圆曲线密码的可认证密钥协商协议的研究[J].北京邮电大学学报,2004,27(3):28-32. 被引量:27
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3Finkenzeller K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons, 2003. 被引量:1
  • 4Sarma S E, Weis S A, and Engels D W. RFID systems and security and privacy implications. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHES 2002). Lectures Notes in Computer Science 2523. Berlin: Springer-Verlag, 2003: 454-469. 被引量:1
  • 5Sarma S E, Weis S A, and Engels D W. Pmdio frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes, 2003, 6(1): 2-9. 被引量:1
  • 6Ohkubo M, Suzuki K, and Kinoshita S. Hash-chain based forward secure privacy protection scheme for low-cost RFID. Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai, 2004: 719-724. 被引量:1
  • 7Rhee K, Kwak J, and Kim S. Challenge-response based RFID authentication protocol for distributed database environment Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005). Lectures Notes in Computer Science 3450. Berlin: Springer-Verlag, 2005: 70-84. 被引量:1
  • 8Hun WookKim and Shu YunLim. Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security. 2006 International Conference on Hybrid Information Technology (ICHIT~06), Ichit, 2006.11, Vol. 2: 718-723. 被引量:1
  • 9Henrici D and Muller P. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Percomv, 2004: 149-153. 被引量:1
  • 10Zhang Lan and Zhou Huaibei. An improved approach to security and privacy of RFID application system. Proceedings of 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005, Vol2: 1195-1198. 被引量:1

共引文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部