浏览全部资源
扫码关注微信
1. 宁波大学信息科学与工程学院,浙江 宁波 315211
2. 宁波水表股份有限公司,浙江 宁波 315032
[ "张呈钰(1992-),女,宁波大学信息科学与工程学院硕士生,主要研究方向为NFC应用、智能仪器仪表。" ]
[ "王让定(1962-),男,博士,宁波大学信息科学与工程学院教授、博士生导师,主要研究方向为多媒体通信与取证、信息安全、智能抄表及传感网络技术等。" ]
[ "姚灵(1953-),男,宁波水表股份有限公司技术总监、教授级高级工程师兼任中国计量协会水表工作委员会副秘书长,主要研究方向为流量仪表与精密仪器。" ]
[ "傅松寅(1982-),男,宁波大学信息科学与工程学院博士生、助理研究员,主要研究方向为无线传感网络、智能抄表。" ]
[ "左富强(1982-),男,宁波水表股份有限公司高级工程师,主要研究方向为智能水流量仪表及嵌入式系统。" ]
网络出版日期:2017-08,
纸质出版日期:2017-08-15
移动端阅览
张呈钰, 王让定, 姚灵, 等. 一种适用于NFC移动设备的双向认证安全方案[J]. 电信科学, 2017,33(8):163-172.
Chengyu ZHANG, Rangding WANG, Ling YAO, et al. A mutual authentication security scheme for mobile NFC devices[J]. Telecommunications science, 2017, 33(8): 163-172.
张呈钰, 王让定, 姚灵, 等. 一种适用于NFC移动设备的双向认证安全方案[J]. 电信科学, 2017,33(8):163-172. DOI: 10.11959/j.issn.1000-0801.2017178.
Chengyu ZHANG, Rangding WANG, Ling YAO, et al. A mutual authentication security scheme for mobile NFC devices[J]. Telecommunications science, 2017, 33(8): 163-172. DOI: 10.11959/j.issn.1000-0801.2017178.
近场无线通信(NFC)是一种已经被广泛应用的短距无线通信技术。其中最常见的是将NFC技术应用于移动支付和门禁访问控制等应用。从技术上讲,这些应用利用NFC模拟卡模式将NFC设备模拟成银行卡或门禁卡,然后等待外部阅读器验证。在这类应用场景下,选取合适的安全认证方案是非常重要的。首先,介绍了现有的NFC认证系统和安全方案并分析了系统安全需求和潜在的安全风险。然后,采用Hash、AES和口令Key动态更新机制,提出了一种适用于NFC移动设备的双向认证安全方案,并设计了自同步机制。最后,利用GNY逻辑以形式化证明的形式证明了方案的安全性,分析表明该方案能解决伪造、重放攻击、窃听、篡改、异步攻击等安全问题。
Near field communication (NFC) is a kind of short-range wireless communication technology which has been applied around the world.The applications of mobile payments and access control are the most common applications of NFC technology.Technically
the NFC device can be used as a bank card or an entrance card with the help of the card emulation mode of NFC
which will be validated by external reader.It is very essential to select a appropriate and safe certification scheme in this scenario.First of all
the existing NFC authentication system and security scheme was introduced and the system security requirements and potential security risks were analyzed.Then
by using Hash
AES and password Key dynamic updating mechanism
a mutual authentication security scheme for mobile NFC devices was proposed
and the synchronization mechanism was designd.Finally
GNY logic was used to prove the security correctness of our proposed scheme.The security analysis shows that our scheme can avoid a number of attacks
such as forgery
replay attack
eavesdropping
tampering attack
asynchronous attack and so on.
CHENG H C , LIAO W W , CHI T Y , et al . A secure and practical key management mechanism for NFC read-write mode [C ] // 13th International Conference on Advanced Communication Technology (ICACT2011),February 13-16,2011,Seoul,South Korea.[S.l.:s.n] . 2011 : 1095 - 1111 .
丁振华 , 李锦涛 , 冯波 , 等 . 基于 Hash 函数的 RFID 安全认证协议研究 [J ] . 计算机研究与发展 , 2009 , 46 ( 4 ): 583 - 592 .
DING Z H , LI J T , FENG B , et al . Research on Hash-based RFID security authentication protocol [J ] . Journal of Computer Research and Development , 2009 , 46 ( 4 ): 583 - 592 .
曾丽华 , 熊璋 , 张挺 , 等 . Key值更新随机Hash锁对RFID安全隐私的加强 [J ] . 计算机工程 , 2007 , 33 ( 3 ): 151 - 153 .
ZENG L H , XIONG Z , ZHANG T , et al . Key Value renewal random hash lock for security and privacy enhancement of RFID [J ] . Computer Engineering , 2007 , 33 ( 3 ): 151 - 153 .
周世杰 , 张文清 , 罗嘉庆 , 等 . 射频识别(RFID)隐私保护技术综述 [J ] . 软件学报 , 2015 , 26 ( 4 ): 960 - 976 .
ZHOU S J , ZHANG W Q , LUO J Q , et al . Design and analysis of cryptographic protocols for RFID [J ] . Chinese Journal of Computers , 2007 , 33 ( 3 ): 151 - 153 .
钱萍 , 吴蒙 . 一种基于 Hash 函数的 RFID 安全认证方法 [J ] . 电信科学 , 2011 , 27 ( 10 ): 109 - 112 .
QIAN P , WU M . A security RFID authentication method based on Hash function [J ] . Telecommunications Science , 2011 , 27 ( 10 ): 109 - 112 .
NIU B , ZHU X , CHI H , et al . Privacy and authentication protocol for mobile RFID systems [J ] . Wireless Personal Communications , 2014 , 77 ( 3 ): 1713 - 1731 .
张辉 , 侯朝焕 , 王东辉 , 等 . 一种基于部分 ID 的新型 RFID安全隐私相互认证协议 [J ] . 电子与信息学报 , 2009 , 31 ( 4 ): 853 - 856 .
ZHANG H , HOU Z H , WANG D H , et al . A new security and privacy on RFID mutual authentication protocol based on partial ID [J ] . Journal of Electronics & Information Technology , 2009 , 31 ( 4 ): 853 - 856 .
FELDHOFER M , DOMINIKUS S , WOLKERSTORFER J . Strong authentication for RFID systems using the AES algorithm [C ] // Cryptographic Hardware and Embedded Systems(CHES 2004),August 11-13,2004,Cambridge,MA,USA.[S.l.:s.n] . 2004 : 357 - 370 .
BADRA M , BADRA R B . A lightweight security protocol for NFC-based mobile payments [J ] . Procedia Computer Science , 2016 ( 83 ): 705 - 711 .
EUN H , LEE H , OH H . Conditional privacy preserving security protocol for NFC applications [J ] . IEEE Transactions on Consumer Electronics , 2013 , 59 ( 1 ): 153 - 160 .
HE D , KUMAR N , LEE J H . Secure pseudonym-based near field communication protocol for the consumer internet of things [J ] . IEEE Transactions on Consumer Electronics , 2015 , 61 ( 1 ): 56 - 62 .
李杰 . RFID 安全认证协议研究与设计 [D ] . 西安:西安电子科技大学 , 2012 .
LI J . Research and design on RFID security authentication protocol [D ] . Xi’an:Xidian University , 2012 .
GOLDREICH O , GOLDWASSER S , MICHALI S . How to construct random functions [J ] . Journal of the ACM , 1986 , 33 ( 4 ): 792 - 807 .
高树静 , 曲英杰 , 宋廷强 . 基于单向函数的伪随机数发生器 [J ] . 计算机研究与发展 , 2015 , 52 ( 6 ): 1394 - 1399 .
GAO S J , QU Y J , SONG T Q . Pseudorandom number generators based on one-way functions [J ] . Journal of Computer Research and Development , 2015 , 52 ( 6 ): 1394 - 1399 .
LI G , NEEDHAM R , YAHALOM R . Reasoning about belief in cryptographic protocols [C ] // IEEE Symposium on Security &Privacy,May 7-9,1990,Oakland,CA,USA . New York:IEEE Computer Society , 1990 : 234 - 248 .
0
浏览量
805
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构