期刊文献+

射频识别LMAP协议改进研究

Improvement research on LMAP protocol for radio frequency identification
下载PDF
导出
摘要 安全问题是射频识别技术领域的重要问题,轻量级安全协议成为该技术领域研究的主流。针对轻量级相互认证协议易受克隆攻击、去同步攻击等安全隐患问题,在对原有协议分析的基础上提出了系列改进措施,即通过对原有协议增加时间戳机制、物理不可克隆函数(physical unclonable function,PUF)电路以及改进密钥的生成方式来提高协议的安全性,并利用BAN逻辑对改进协议的安全性进行形式化证明。从安全性、计算量和存储量等方面将改进协议与其他协议进行比较,结果表明,协议安全性高,计算量小,也适合标签的存储量,在射频识别领域安全方面具有一定的应用价值。 Security is an important issue in the field of radio frequency identification,and the research on lightweight security protocol has become the mainstream of this field.Since the lightweight mutual authentication protocol is vulnerable to clone attack,de-synchronization attack or other security problems,this paper proposes a series of improvement measures based on the analysis of original protocol,such as adding the timestamp mechanism,physical unclonable function(PUF)circuit and improving the way of generating the key to improve the security of the lightweight mutual authentication protocol.Then the security of the improved protocol is verified by the BAN logic.Finally the improved protocol is compared with other protocols in terms of security,computation and storage.The results show that the protocol has high security,less calculation,and is suitable for the storage of tags.It has certain application value in the field of radio frequency identification.
出处 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2017年第6期814-821,共8页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 国家自然科学基金资助项目(61273302)~~
关键词 射频识别 协议改进 时间戳机制 PUF电路 BAN逻辑 radio frequency identification protocol improvement timestamp mechanism PUF circuit BAN logic
  • 相关文献

参考文献8

二级参考文献134

  • 1薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:61
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469 被引量:1
  • 4Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9 被引量:1
  • 5Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212 被引量:1
  • 6Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724 被引量:1
  • 7Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153 被引量:1
  • 8Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219 被引量:1
  • 9Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84 被引量:1
  • 10Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627 被引量:1

共引文献247

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部