期刊文献+

基于共享秘密的RFID双向认证协议 被引量:2

Mutual Authentication Protocol for RFID Based on Shared Secret
下载PDF
导出
摘要 在研究和分析已有RFID认证协议的基础上,提出了一种基于共享秘密的RFID双向认证协议,分析了协议的安全性,并运用BAN逻辑的形式化分析方法,对协议的安全性进行了推理证明。结果表明实现了标签、读写器和后端数据库三者的相互认证,在实现上仅使用Hash函数和异或操作,具有安全性高、成本低等特点。 On the basis of study and the analysis of existing RFID authentication protocols, we propose a mutual authentication protocol for RFID based on shared secret in this paper. It analyzes the security of the protocol, and uses BAN logic as a formal analysis to prove the security of the protocol. The result shows that this protocol realizes mutual authentication between tag, reader-writer and back-end data base. From the implementation point, the protocol just uses Hash function and exclusive OR operation. It is characterized by high security and low cost.
出处 《电气自动化》 2015年第1期44-45,60,共3页 Electrical Automation
基金 甘肃省高等学校研究生导师科研项目(1218-02) 甘肃省天水市自然科学科技支撑项目(2013-31)
关键词 共享秘密 隐私保护 射频识别 双向认证 BAN逻辑 sshared secret privacy protection radio frequency identification ( RFID ) mutual authentication BAN logic
  • 相关文献

参考文献10

  • 1潘涛,左开中,郭良敏,罗永龙.基于异或运算的低成本RFID双向认证协议[J].计算机工程,2012,38(9):278-281. 被引量:7
  • 2Q Y DAI, R Y ZHONG, M L WANG, et al. RFID-enable real-time multi-experiment training center management system [ J ]. Intcrnationa| Journal of Advanced Science and Technology, 2009, 7 ( 6 ) 27 - 48. 被引量:1
  • 3丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592. 被引量:93
  • 4钱权,贾彦龙,张瑞.基于随机数同步更新的RFID安全协议[J].计算机工程,2013,39(8):9-14. 被引量:6
  • 5SARMA S, WEIS S, ENGELS D. RFID systems and security and privacy implications [ C ] //Proc of the 4th Int Workshop on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2002 : 454 -469. 被引量:1
  • 6WEISS A,SARMA S E, RIVEST R L, et al. Secnrity and privacy aspects of low-cost radio frequency identification systems [ C ] //Proc of the 1st Security in Pervasive Computing. Berlin: Springer, 2003 : 201 - 212. 被引量:1
  • 7OHKUBO M, SUZUKI K, KINOSHITA S. Hash-chain based furward- secure privacy protection scheme for low-cost RFID [ C ] //Proceedings of the 2004 Symposium, Cryptography and Information Security, 2004 .719 - 724. 被引量:1
  • 8HENRICI D, MULLER P. Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers [ C ]//Proceedings of the Second IEEE Annual Conference on 14 -17 March 2004 : 149 - 153. 被引量:1
  • 9姚华桢,刘传菊,李小敏.基于AES与NTRU的RFID安全认证协议[J].计算机工程与应用,2012,48(35):80-84. 被引量:13
  • 10李建华,张爱新,薛质.网络安全协议的形式化分析与验证[M].北京:机械工业出版社,2010. 被引量:12

二级参考文献72

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004 被引量:1
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248 被引量:1
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643 被引量:1
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44 被引量:1
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001 被引量:1
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84 被引量:1
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003 被引量:1
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140 被引量:1
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170 被引量:1

共引文献125

同被引文献24

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2郁滨,蔡振国,陈韬.参数可选的椭圆曲线加密算法的整体设计[J].计算机应用研究,2007,24(6):145-146. 被引量:3
  • 3Michael Burrows,Martin Abadi,Roger Needham.A logic of authentication[J]. ACM Transactions on Computer Systems (TOCS) . 1990 (1) 被引量:1
  • 4Bogdanov A,,Knudsen L R,Leander G et al.PRESENT:An ultra-lightweight block cipher. Lecture Notes in Computer Science . 2007 被引量:4
  • 5RHEE K,KWAK J,KIM S,et al.Challenge-response based RFID authentication protocol for distributed database environment. Proceedings of the 2nd International Conference on Security in Pervasive Computing . 2005 被引量:1
  • 6MIYAKO O,KOUTAROU S,SHINGO K.Hash-chainbased forwardsecure privacy protection scheme for low-cost RFID. Proceedings of the 2004 Symposium on Cryp-tograph And Information Security (SCIS2004) . 2004 被引量:1
  • 7LEE S M,HWANG Y J,LEE D H,et al.Efficient authentication for low-cost RFID systems. Proceedings of International Conference on Com-putational Science and Its Applications . 2005 被引量:1
  • 8PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,et al.LMAP:a real lightweight mutual authentication protocol forlow-cost RFID tags. Proc Second Workshop on RFID Se-curity . 2006 被引量:1
  • 9SARMA S E,WEIS S A,ENGLES D W.RFID systems and security and Privacym plications. Lectures Notes in Computer Science . 2003 被引量:1
  • 10GODOR NORBERT G.Elliptic curve cryptography based mutual authentication protocol for low computation capacity RFID systems performance analysis by imulations. 2010 IEEE International Conference on . 2010 被引量:1

引证文献2

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部