期刊文献+

基于动态密钥的移动RFID安全认证协议 被引量:5

Mobile RFID security authentication protocol based on dynamic key
下载PDF
导出
摘要 针对现有RFID安全认证协议可移动性差,以及现有协议密钥更新失败导致的跟踪、数据不同步问题,提出了一种基于动态密钥的移动RFID安全认证协议。采用随机数来动态选取认证密钥,既保证了密钥新鲜性,又避免跟踪与数据不同步问题,并且在服务器上对阅读器进行一个预处理操作,有效地阻止了外部非法阅读器对服务器发起的假冒攻击和拒绝服务攻击。分析了协议的性能和安全性,分析结果表明该协议达到了安全性要求且移动性强,计算复杂度低,适用于大规模移动RFID系统。 In view of the poor mobility of the existing RFID security authentication protocol, as well as the tracking, anddata synchronization problems caused by the failure of the agreements key update, this paper proposes a mobile RFIDsecurity authentication protocol based on dynamic key. Random number is used to select the authentication key dynamically,which can not only keep the freshness of the key, but also avoid tracking and data synchronization problems. A preprocessof reader is taken on the server, which can effectively prevents impersonation and denial of service attacks on the serverfrom the external illegal reader. This paper analyses the performance and security of the protocol. The analysis resultsshow that the protocol meets the security requirements and has good mobility and low computational complexity, which issuitable for large-scale mobile RFID system.
作者 肖红光 陈蓉 巫小蓉 史长琼 严利辉 邹强 XIAO Hongguang;CHEN Rong;WU Xiaorong;SHI Changqiong;YAN Lihui;ZOU Qiang(School of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha 410114, China)
出处 《计算机工程与应用》 CSCD 北大核心 2016年第22期113-117,202,共6页 Computer Engineering and Applications
基金 国家自然科学基金青年项目(No.41201468) 湖南省科技攻关项目(No.2013FJ4034)
关键词 移动RFID 动态密钥 安全 隐私 认证协议 协议分析 mobile RFID dynamic key safety privacy authentication protocol protocol analysis
  • 相关文献

参考文献6

二级参考文献71

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2罗大文,董丽莉,何明星.基于椭圆曲线的数字签名方案[J].西华大学学报(自然科学版),2006,25(3):79-80. 被引量:1
  • 3曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 4International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004 被引量:1
  • 5Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248 被引量:1
  • 6Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643 被引量:1
  • 7Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44 被引量:1
  • 8Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001 被引量:1
  • 9Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84 被引量:1
  • 10Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003 被引量:1

共引文献122

同被引文献28

引证文献5

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部