期刊文献+

一种基于Hash函数的RFID认证改进协议 被引量:5

An improved hash-based RFID security authentication algorithm
原文传递
导出
摘要 针对使用无线射频识别技术(RFID)进行认证时存在的安全问题,提出了一种结合Hash函数与时间戳技术的认证协议。将标签的标识和时间戳数据通过Hash函数进行加密传输并进行认证。通过BAN逻辑证明和建立协议的Petri网模型仿真实验证明了该协议具有良好的前向安全性,能有效防止重放、位置跟踪、非法访问等攻击。 To settle the potential security problems during the authentication of radio frequency identification,an authen-tication protocol combined with Hash function and time stamp was proposed.The tag’s identification and time stamp data were encrypted and transmitted through the Hash function,when they were used to authenticate.The ban logic proof and the simulative experiment of established Petri model showe the protocol has good forward security and can prevent replay,location tracking,illegal reading and other illegal attacks.
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2014年第9期154-159,170,共7页 Journal of Shandong University(Natural Science)
基金 贵州省科学技术基金资助项目(黔科合J字LKS[2010]37号]) 贵阳市科技局工业振兴科技计划项目(筑科合同[2012101]12)
关键词 RFID HASH函数 认证协议 RFID Hash function authentication protocol
  • 相关文献

参考文献10

  • 1游战清等编著..无线射频识别技术 RFID 理论与应用[M].北京:电子工业出版社,2004:285.
  • 2康东,石喜勤,李勇鹏等编著..射频识别 RFID 核心技术与典型应用开发案例[M].北京:人民邮电出版社,2008:469.
  • 3SARMA S E, WEIS S A, ENGELS D W. RFID systems and security and privacy implications[C]//Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHE 2002). Berlin: Springer, 2002:454-469. 被引量:1
  • 4WEIS S A, SARMA S E, RIVEST R L, et al.Security and privacy aspects of low-cost radio frequency identification systems[C]//Proceeding of the1st International Conference on Security in Pervasive Computing. Berlin: Springer, 2003:201-212. 被引量:1
  • 5HENRICI D, MULLER P.Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers[C]//Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW' 04). Washington: IEEE Computer Society, 2004:149-153. 被引量:1
  • 6Stuart Haber, W Scott Stornetta. How to time-stamp a digital document [J]. Journal of Cryptology, 1991, 3(2):99-111. 被引量:1
  • 7谢晓尧著..电子商务网络协议的形式化分析理论与应用[M].北京:科学出版社,2008:146.
  • 8李红静,刘丹.基于矩阵理论的RFID认证协议设计及BAN逻辑分析[J].计算机应用,2013,33(7):1854-1857. 被引量:3
  • 9TSAI J J P, YANG Jennhwa, CHANG Yao-Hsiung. Timing constraint Petri nets and their application to schedulability analysis of real-time system specifications [J]. IEEE Transactions on Software Engineering, 1995, 21(1):32-49. 被引量:1
  • 10张兵,马新新,秦志光.基于hash运算的RFID认证协议分析和改进[J].计算机应用研究,2011,28(11):4311-4314. 被引量:13

二级参考文献19

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2中国国家科技部会.中国射频识别(RFID)技术政策白皮书[EB/OL].http://www.eet-china.tom/ARTICLES/2006JUN/PDF/CHINARFIDWHITEPAPER.PDF,2006-06-09. 被引量:1
  • 3SARMA S E, WEISS A, ENGLES D W. Radio frequency identification: secure risks and challenges [ J ]. RSA Laboratories Cryptobytes, 2003, 6(1) :2-9. 被引量:1
  • 4SEIS A, SAIMA S E, RIVEST R L. Security and privacy aspects of low cost radio frequency identification system [ C ]//Proc of the 1 st International Conference on Security in Pervasive Computing. Berlin Springer-Verlag, 2004 : 201 - 212. 被引量:1
  • 5MOINAR D, WAGNER D. Privacy and security in library RFID: issues, practices, and architectures[ C ]//Proc of the 11 th ACM Conference on Computer and Communication Security. New York:ACM, 2004:210-219. 被引量:1
  • 6LEE S M, HWANG Y J, LEE D H,et al. Efficient authentication for low cost RFID system [ C ]//Proc of the International Conference on Computational Science and Its Applications. Berlin: Springer-Verlag, 2005:619-627. 被引量:1
  • 7DUC D N, LEE H, KIM K. Enhancing security of EPC global GEN-2 RFID tag against traceability and cloning[ EB/OL]. [ 2012 - 12 - 20 ]. http://www, autoidlabs, org/uploads/media/AU- TOIDLABS-WP-SWNET-0!6. pdf. 被引量:1
  • 8CHIEN H Y, CHEN C H. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards [ J]. Computer Standards and Interfaces, 2007, 29(2): 254-259. 被引量:1
  • 9PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, TAPIADOR J M E, et al. Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard[J]. Computer Standards and Interfaces, 2009, 31(2): 372-380. 被引量:1
  • 10SARMA S E, WEISS A, ENGELS D W. RFID systems and securi- ty and privacy implications [ C]// Proceedings of the 4th Interna- tional Workshop on Cryptographic Hardware and Embedded Sys- tems. Berlin: Springer, 2003:454-469. 被引量:1

共引文献14

同被引文献28

引证文献5

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部