期刊文献+

增强型匿名RFID双向认证协议eARAP的设计与分析 被引量:1

Design and analysis of an enhanced anonymous mutual RFID authentication protocol eARAP
下载PDF
导出
摘要 对匿名RFID身份认证协议(ARAP)进行了深入分析,指出其存在无法抵抗假冒攻击、多标签冲突和阅读器功能受限等三方面的缺陷,提出相应的改进协议e ARAP,并对e ARAP协议进行了严格的形式化分析和安全性能分析。结果表明:e ARAP协议能够达到预期的认证目标,能够抵抗假冒、拒绝服务等诸多攻击,安全性能有所增强,且协议执行的计算量明显减少,具有较高的可行性。 The analysis of anonymous RFID authentication protocol( ARAP) is given,which shows that there are three kinds of defect including failure on resistance to counterfeiting attack,multi label conflict and reader function limitation. An improved protocol named e ARAP is proposed. The formal analysis based on BAN logic and the analysis of security and performance are given. The results show that e ARAP protocol achieves the expected authentication target. It can resist theattacks such as counterfeiting and denial of service with enhanced security,and the calculation in the execution process decreases significantly.
出处 《广西大学学报(自然科学版)》 CAS 北大核心 2015年第6期1494-1500,共7页 Journal of Guangxi University(Natural Science Edition)
基金 国家自然科学基金资助项目(61562018) 国际科技合作专项项目(2015DFR10510) 海南省自然科学基金资助项目(20156250 614231)
关键词 无线射频识别 ARAP协议 身份认证 形式化分析 RFID ARAP protocol identity authentication formal analysis
  • 相关文献

参考文献14

  • 1SARMA S E, WEIS S A,ENGELS D W. RFID systems and security and privacy implications[ C]//Proceedings of the 4th In-ternational Workshop on Cryptographic Hardware and Embedded Systems. New York: Springer-Verlag, 2002 : 454-469. 被引量:1
  • 2WEIS S A, SARMA S E, RIVEST R L, et al. Security and privacy aspects of low-cost radio frequency identification sys-tems[ J]. Security in Pervasive Computing, 2004, 28(2) :201-212. 被引量:1
  • 3OHKUBO M,SUZUKI K, KINOSHITA S. Hash-chain based forward-secure privacy protection scheme for low-cost RFID[C]//Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004). Berlin: Springec Verlag,2004:719-724. 被引量:1
  • 4SHEN J, CHOI D, MOH S, et al. A novel anonymous RFID authentication protocol providing strong privacy and security[C ]//Proceedings 2010 International Conference on Multimedia Information Networking and Security. Nanjing: AcnPress, 2010: 584-588. 被引量:1
  • 5田芸,陈恭亮,李建华.针对RFID身份认证协议——ARAP协议的攻击及改进[J].中国电子科学研究院学报,2011,6(6):556-560. 被引量:6
  • 6李景峰,郭卫锋.对ARAP认证协议的攻击及其改进[J].武汉大学学报(理学版),2012,58(6):526-530. 被引量:3
  • 7RHEE K, KWAK J, KIM S,et al. Challenge-response based RFID authentication protocol for distributed database envi-ronment [C ] //Proceedings of the 2nd International Conference on Security in Pervasive Computing ( SPC 2005 ) . LecturesNotes in Computer Science 3450. Berlin : Springer-Verlag, 2005 : 70-84. 被引量:1
  • 8陆桑璐,谢磊编著..射频识别技术 原理、协议及系统设计[M].北京:科学出版社,2014:289.
  • 9丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592. 被引量:93
  • 10BURRROWS M,ABADI M, NEEDHAM R. A logic of authentication [ J]. ACM Transactions on Computer Systems,1990,8(1) :18-36. 被引量:1

二级参考文献70

  • 1李斌,蒋卫寅,凌力.一种基于Key值更新的RFID安全协议设计[J].微型电脑应用,2011(7):15-18. 被引量:2
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3杨世平,李祥.BAN逻辑在协议分析中的密钥猜测分析缺陷[J].计算机工程,2006,32(9):126-127. 被引量:4
  • 4International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004 被引量:1
  • 5Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248 被引量:1
  • 6Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643 被引量:1
  • 7Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44 被引量:1
  • 8Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001 被引量:1
  • 9Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84 被引量:1
  • 10Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003 被引量:1

共引文献128

同被引文献5

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部