浏览全部资源
扫码关注微信
1. 广州科技职业技术学院信息工程学院,广东 广州 510550
2. 华南理工大学计算机科学与工程学院,广东 广州 510006
[ "简碧园(1983−),男,广州科技职业技术学院信息工程学院教研室主任、讲师,主要研究方向为计算机网络技术、云计算技术、信息安全。" ]
[ "刘道微(1989−),男,广州科技职业技术学院信息工程学院硕士生,主要研究方向为信息安全、RFID系统所有权转移协议、RFID系统双向认证协议及 RFID 系统密钥无线生成算法。" ]
网络出版日期:2017-06,
纸质出版日期:2017-06-20
移动端阅览
简碧园, 刘道微. 基于单向伪随机函数的移动RFID系统认证协议[J]. 电信科学, 2017,33(6):138-145.
Biyuan JIAN, Daowei LIU. Mobile RFID system authentication protocol based on one-way pseudo random function[J]. Telecommunications science, 2017, 33(6): 138-145.
简碧园, 刘道微. 基于单向伪随机函数的移动RFID系统认证协议[J]. 电信科学, 2017,33(6):138-145. DOI: 10.11959/j.issn.1000-0801.2017187.
Biyuan JIAN, Daowei LIU. Mobile RFID system authentication protocol based on one-way pseudo random function[J]. Telecommunications science, 2017, 33(6): 138-145. DOI: 10.11959/j.issn.1000-0801.2017187.
针对移动RFID系统认证中可能出现的成本、效率、安全问题,设计了一种基于单向伪随机函数的移动RFID认证协议。协议在满足Gen-2标准的前提下,综合采用位替换运算、异或运算和单向伪随机函数加密通信信息;协议充分利用标签、读写器、后端数据库三方共享密钥和三方通信信息,对信息进行加密传输和加密认证,降低系统成本;通过实现完整三方认证与密钥更新工作,避免协议遭受假冒、去同步化等攻击行为。最后,给出协议GNY理论逻辑证明以及安全、性能分析,表明新协议的可行性与安全性。
Aiming at the cost
efficiency and security of mobile RFID system authentication
a mobile RFID authentication protocol based on one-way pseudo random function was designed.The protocol reduced system cost by making full use of the three party of the shared key and communication information to encrypt transmission and authentication.Through the implementation of three party authentication and key update work
the agreement suffered counterfeit
desynchronization and other attacks was avoided.Finally
the logical proof of GNY and its security and performance analysis were gived to show the feasibility and security of the new protocol.
张平 , 李建武 , 冯志勇 , 等 . 认知无线网络基础理论与关键技术研究 [J ] . 电信科学 , 2014 , 30 ( 2 ): 1 - 13 .
ZHANG P , LI J W , FENG Z Y , et al . Research on basic theory and key technology of cognitive radio network [J ] . Telecommunications Science , 2014 , 30 ( 2 ): 1 - 13 .
方箭 , 王坦 , 黄标 . 高频段宽带无线通信前瞻 [J ] . 电信科学 , 2014 , 30 ( 3 ): 109 - 113 .
FANG J , WANG T , HUANG B . Outlook of broadband wireless communications at high frequency bands [J ] . Telecommunications Science , 2014 , 30 ( 3 ): 109 - 113 .
冯剑 , 王平阳 , 王琳 , 等 . 基于能量获取的无线通信系统研究 [J ] . 电信科学 , 2015 , 31 ( 2 ): 124 - 131 .
FENG J , WANG P Y , WANG L , et al . Research on energy harvesting communication system [J ] . Telecommunications Science , 2015 , 31 ( 2 ): 124 - 131 .
郁昱 , 李祥学 . 基于单向函数的伪随机产生器与通用单向哈希函数 [J ] . 西安邮电大学学报 , 2016 , 21 ( 2 ): 1 - 9 .
YU Y , LI X X . One-way function based pseudorandom generator and universal one-way hash function [J ] . Journal of Xi’an University of Posts and Telecommunications , 2016 , 21 ( 2 ): 1 - 9 .
徐津 , 温巧燕 . 消息认证码的理论研究 [D ] . 北京:北京邮电大学 , 2015 .
XU J , WEN Q Y . Theoretical research on message authentication codes [D ] . Beijing:Beijing University of Posts and Telecommunications , 2015 .
EPC global EPC “radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz version 1.2.0 [EB/OL ] .(2013-03-10)[2017-01-05 ] . http://www.gsl.org/gsmp/ kc/ epc- global/uhfcl92/uhfcl92-1-2-0standard-20080511.pdf http://www.gsl.org/gsmp/ kc/ epc- global/uhfcl92/uhfcl92-1-2-0standard-20080511.pdf .
YEH T C , WU C H , TSENG Y M . Improvement of the RFID authentication scheme based on quadratic residues [J ] . Computer Communications , 2011 , 34 ( 3 ): 337 - 341 .
CHANG P , . A location-privacy-protected RFID authentication scheme [C ] // The 2011 IEEE International Conference on Communications,August 1-3,2011,Chengdu,China . New Jersey:IEEE Press , 2011 : 1 - 4 .
ZHOU J . A quadratic residue-based lightweight RFID mutual authentication protocol with constant-time identification [J ] . Journal of Communications , 2015 , 10 ( 2 ).
NIU B , ZHU X , CHI H , et al . Privacy and authentication protocol for mobile RFID systems [J ] . Wireless Personal Communications , 2014 , 77 ( 3 ): 1 - 19 .
张琪 , 梁向前 , 位书敏 . 基于伪随机函数的移动射频识别认证协议 [J ] . 计算机应用 , 2015 , 35 ( 4 ): 977 - 980 .
ZHANG Q , LIANG X Q , WEI S M . Authentication protocol based on pseudo-random function for mobile radio frequency identification [J ] . Journal of Computer Applications , 2015 , 35 ( 4 ): 977 - 980 .
DOSS R , ZHOU W L , YU S . Secure RFID tag ownership transfer based on quadratic residues [J ] . IEEE Transactions on Information Forensics and Security , 2013 , 8 ( 2 ): 390 - 401 .
WU X Q , ZHANG M , YANG X L . Time-stamp based mutual authentication protocol for mobile RFID system [C ] // Wireless and Optical Communication Conference(WOCC),May 16-18,2013,Chongqing,China . New Jersey:IEEE Press , 2013 : 702 - 706 .
杜宗印 , 章国安 , 袁红林 . 基于位替换运算的RFID双向认证协议 [J ] . 电视技术 , 2013 , 37 ( 19 ): 134 - 137 .
DU Z Y , ZHANG G A , YUAN H L . Bits substitution based on RFID mutual authentication protocol [J ] . Video Engineering , 2013 , 37 ( 19 ): 134 - 137
侯峻峰 , 黄连生 . 安全协议形式化验证方法和安全协议设计研究 [D ] . 北京:清华大学 , 2004 .
HOU J F , HUANG L S . Research on formal verification and design of security protocols [D ] . Beijing:Tsinghua University , 2004 .
0
浏览量
667
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构