期刊文献+

基于Hash轻量级RFID安全认证协议 被引量:13

Lightweight security authentication protocol for RFID based on Hash functions
下载PDF
导出
摘要 为应对伪装攻击、位置攻击、重放攻击、异步攻击和DNS攻击等安全问题,提出一种轻量级安全认证协议—MH协议,对轻量级Hash函数的加密以及认证时间戳做出改进,有效减少逻辑位的操作。为验证该方法的正确性,使用BAN逻辑方法以及SPIN模型检测工具,从多个角度和方面,与其它轻量级安全协议进行比较,在运算复杂度相同的情况下,MH协议的安全强度达到了0.438,具有较强的安全性能。 To deal with the security problems such as camouflage attacks,location attacks,replay attacks,asynchronous attacks and DNS attacks,a lightweight security authentication protocol,MH protocol,was proposed to encrypt the lightweight Hash function and timestamp authentication mechanism,effectively reducing the operation of the logic bit.To verify the correctness of the method,the BAN logic method and the SPIN model detection tool were applied to it and it was compared with other lightweight security protocols from many angles and aspects.The security strength of the MH protocol reaches 0.438 when the computational complexity maintains the same,which shows strong safety performance.
作者 张兴 李畅 韩冬 颜飞 ZHANG Xing;LI Chang;HAN Dong;YAN Fei(School of Electronic and Information Engineering, Liaoning University of Technology, Jinzhou 121001, China)
出处 《计算机工程与设计》 北大核心 2018年第5期1269-1275,1309,共8页 Computer Engineering and Design
基金 国家自然科学基金面上基金项目(61272214) 辽宁省高等学校杰出青年学者成长计划基金项目(LJQ2014066) 辽宁省自然科学基金项目(20170540434)
关键词 RFID系统 无源标签 安全认证协议 M-Hash函数 BAN逻辑 SPIN模型 RFID system passive tag security authentication protocol M-Hash function BAN logic SPIN model
  • 相关文献

参考文献3

二级参考文献21

  • 1Burrows M, Abadi M,Needham R.A logic of authentica- tion[R].Degital Equipment Corporation, 1989. 被引量:1
  • 2Lowe G.Breaking and fixing the Needham-Schroeder pub- lic-key authentication protocol using CSP and FDR[C]// LNCS 1055 : Proceedings of TACAS.[S.1.] : Springer-Verlag, 1996. 被引量:1
  • 3I Clarke E M,Grumberg O,Peled D.Model checking[M]. [S.1.] :MIT Press, 1999. 被引量:1
  • 4Meadows C.Analysis of the Internet key exchange proto-col using the NRL protocol analyzer[C]//Proceedings of IEEE Symposium on Security and Privacy.[S.1.]:IEEE Computer Society Press, 1999: 216-231. 被引量:1
  • 5Meadows C.Analyzing the Needham-Schroeder public key protocol: a comparison of two approaches[C]//Bertion E. LNCS l146:Proceedings of Computer Security,ESORICS'96. [S.1.] : Springer-Verlag, 1996. 被引量:1
  • 6Holzmann G J.The spin model checker:primer and ref- erence manual[M].[S.1.] :Addison-Wesley,2004. 被引量:1
  • 7Maggi P, Sisto R.Using SPIN to verify security proper- ties of cryptographic protocols[C]//SPIN' 2002 Workshop, 2002. 被引量:1
  • 8Khan A S, Mukund M, Suresh S RGeneric verification of security protocols[C]//SP1N 2005,2005:221-235. 被引量:1
  • 9Dolev D, Yao A.On the securiEz of public key protocols[J]. IEEE Trans on Information Theory, 1983,29(2) : 198-208. 被引量:1
  • 10Ramanujam R, Suresh S P. Decidability of context-ex- plicit security protocols[J].Jottrnal of Computer Security, 2005,13(1):135-165. 被引量:1

共引文献9

同被引文献82

引证文献13

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部