浏览全部资源
扫码关注微信
1. 绵阳职业技术学院,四川 绵阳 621000
2. 西南科技大学,四川 绵阳 621010
[ "李川(1972−),男,绵阳职业技术学院副教授,主要研究方向为信号处理与传输。" ]
[ "李学俊(1975−),男,博士,西南科技大学计算机学院副教授,CCF会员,主要研究方向为数据库应用、多源图像数据融合及处理。" ]
网络出版日期:2017-06,
纸质出版日期:2017-06-20
移动端阅览
李川, 李学俊. 一种基于散列函数的RFID安全认证方法[J]. 电信科学, 2017,33(6):129-137.
Chuan LI, Xuejun LI. A secure authentication method based on hash function for RFID system[J]. Telecommunications science, 2017, 33(6): 129-137.
李川, 李学俊. 一种基于散列函数的RFID安全认证方法[J]. 电信科学, 2017,33(6):129-137. DOI: 10.11959/j.issn.1000-0801.2017108.
Chuan LI, Xuejun LI. A secure authentication method based on hash function for RFID system[J]. Telecommunications science, 2017, 33(6): 129-137. DOI: 10.11959/j.issn.1000-0801.2017108.
RFID系统中有限的标签芯片资源,导致数据与信息的安全成为RFID系统的重要问题之一,散列函数的单向性为RFID的识别和认证提供了一种既可靠又有效的途径。在分析了现有几种典型散列认证协议的基础上,提出了一种新的基于散列函数的安全认证协议。本协议旨在解决手持式、无线连接的RFID阅读器与标签、服务器间的识别,利用散列函数实现服务器、阅读器以及电子标签三者之间的相互认证。经过安全性与性能的分析,新协议在采用较小的存储空间和较低的运算开销的情况下,可抵抗已知的大多数攻击,有效地保证了RFID系统中数据和隐私的安全,实现了终端与服务器间的双向认证和匿名认证,非常适合于在大型分布式系统中使用。
Limited by the tag chip resource of a radio-frequency identification (RFID) system
the data and information security has been an important issue of an RFID system.The one-way Hash function provides an efficient and reliable approach for the identification and authentication of the RFID system.Based on the analysis of several typical Hash authentication protocols
a novel secure authentication protocol based on the Hash function was proposed.The protocol was intended to tackle the identification among the handheld RFID reader
tags and server.Specifically
the protocol utilizes the Hash function to achieve the mutual authentication between the above three objects.The performance analysis shows that the proposed protocol can resist the most known attacks with reduced storage capacity and lower computation overhead.Therefore
the proposed strategy effectively ensures the data and privacy security of the RFID system
achieving the bidirectional anonymous authentication between the terminal and server
which is very suitable for the distributed large-scale RFID system.
黄玉兰 . 物联网射频识别(RFID)核心技术详解:第2版 [M ] . 北京 : 人民邮电出版社 , 2012 : 1 - 14 .
HUANG Y L . Radio frequency identification development internals:2nd edition [M ] . Beijing : Posts and Telecom PressPress , 2012 : 1 - 14 .
GAO L , MA M , SHU Y , et al . An ultralight weight RFID authentication protocol with CRC and permutation [J ] . Journal of Network and Computer Applications , 2014 ( 41 ): 37 - 46 .
肖锋 , 周亚建 , 周景贤 , 等 . 标准模型下可证明安全的RFID 双向认证协议 [J ] . 通信学报 , 2013 , 34 ( 4 ): 82 - 87 .
XIAO F , ZHOU Y J , ZHOU J X , et al . Provable secure mutual authentication protocol for RFID in the standard model [J ] . Journal on Communications , 2013 , 34 ( 4 ): 82 - 87 .
LIAO Y P , HSIAO C M . A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol [J ] . Ad Hoc Networks , 2014 ( 18 ): 133 - 146 .
张敏 . 基于物联网技术下的图书管理系统构建 [J ] . 河南理工大学学报(自然科学版) , 2012 , 31 ( 3 ): 326 - 329 .
ZHANG M . Research on system library management based on technology of internet of things [J ] . Journal of Henan Polytechnic University (Natural Science) , 2012 , 31 ( 3 ): 326 - 329 .
SARMA S , WEIS S , ENGELS D . RFID systems and security and privacy implications [C ] // The 4th International Workshop on Cryptographic Hardware and Embedded Systems,August 13-15,2002,Redwood Shores,CA,USA . Berlin:Springer , 2002 : 454 - 469 .
WEIS S A , SARMA S E , RIVEST R L , et al . Security and privacy aspects of low-cost radio frequency identification systems [C ] // The 1st Security in Pervasive Computing,March 12-14,2003,Boppard,Germany . Berlin:Springer , 2003 : 201 - 212 .
GAO X , XIANG Z , WANG H , et al . An approach to security and privacy of RFID system for supply chain [C ] // 2004 IEEE International Conference on E-Commerce Technology for Dynamic E-Business,September 13-15,2004,Beijing,China . New Jersey:IEEE Press , 2004 : 164 - 168 .
HENRICI D , MAULLER P . Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers [C ] // The 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops,March 14-17,2004,Los Alamitos,CA,USA . New Jersey:IEEE Press , 2004 .
LEE S M , HWANG Y J , LEE D H , et al . Efficient authentication for low-cost RFID systems [C ] // The 2005 International Conference on Computational Science and its Applications,May 9-12,2005,Singapore . Berlin:Springer , 2005 : 619 - 627 .
陶源 , 周喜 , 马玉鹏 , 等 . 基于散列函数的移动双向认证协议 [J ] . 计算机应用 , 2016 , 36 ( 3 ): 657 - 660 .
TAO Y , ZHOU X , MA Y P , et al . Mobile mutual authentication protocol based on Hash function [J ] . Journal of Computer Applications , 2016 , 36 ( 3 ): 657 - 660 .
王明斐 , 魏勇 , 孙挺 . 基于散列函数和排列的轻量级RFID安全认证协议 [J ] . 湘潭大学自然科学学报 , 2016 ( 1 ): 115 - 119 .
WANG M F , WEI Y , SUN T . A lightweight RFID security authentication protocol based on Hash function and arrangement [J ] . Natural Science Journal of Xiangtan University , 2016 ( 1 ): 115 - 119 .
朱洪岩 , 谢晓尧 , 吴景春 . 基于散列函数的RFID安全认证协议改进 [J ] . 长江大学学报(自然科学版) , 2016 , 13 ( 13 ): 39 - 43 .
ZHU H Y , XIE X Y , WU J C . RFID authentication protocol development based on Hash function [J ] . Journal of Yangtze University (Natural Science Edition) , 2016 , 13 ( 13 ): 39 - 43 .
赵太飞 , 邹波 , 尹航 . 基于散列链的RFID认证协议 [J ] . 微型机与应用 , 2016 , 35 ( 19 ): 60 - 63 .
ZHAO T F , ZOU B , YIN H . RFID authentication protocol based on Hash chain [J ] . Microcomputer and its Applications , 2016 , 35 ( 19 ): 60 - 63 .
贝毅君 , 干红华 , 程学林 , 等 . RFID技术在物联网中的应用 [M ] . 北京 : 人民邮电出版社 , 2013 .
BEI Y J , GAN H H , CHENG X L , et al . RFID technology applications in internet of things [M ] . Beijing : Posts & Telecom PressPress , 2013 .
0
浏览量
90
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构