浏览全部资源
扫码关注微信
[ "刘直良(1982-),男,黄淮学院信息工程学院讲师,主要研究方向为网络与通信。" ]
网络出版日期:2018-04,
纸质出版日期:2018-04-20
移动端阅览
刘直良. 一种基于二次剩余的改进的RFID认证协议[J]. 电信科学, 2018,34(4):90-97.
Zhiliang LIU. An improved RFID authentication protocol based on quadratic residue[J]. Telecommunications science, 2018, 34(4): 90-97.
刘直良. 一种基于二次剩余的改进的RFID认证协议[J]. 电信科学, 2018,34(4):90-97. DOI: 10.11959/j.issn.1000-0801.2018042.
Zhiliang LIU. An improved RFID authentication protocol based on quadratic residue[J]. Telecommunications science, 2018, 34(4): 90-97. DOI: 10.11959/j.issn.1000-0801.2018042.
针对现有基于二次剩余的无线射频识别(RFID)认证协议在安全和成本方面的漏洞与不足,设计了一种基于二次剩余的改进的RFID双向认证协议。改进的协议在基础二次剩余算法框架下,混入随机数加密,使消息在数据库认证识别时更为高效快速;引入超轻量级位替换运算和异或运算加密通信信息,降低系统计算成本;加入数据库端随机数查重校验机制,避免协议遭受去同步化和拒绝服务等攻击行为;最后,给出协议的GNY逻辑证明,表明改进协议的可行性。通过分析协议安全性和性能,表明改进协议具有较高安全性和较低成本。
In view of the existing radio frequency identification(RFID) authentication protocol based on quadratic residue in the security and cost aspects of the loopholes and deficiencies
an improved RFID bidirectional authentication protocol based on the quadratic residue was designed.The improved protocol was mixed with random number encryption under the framework of the quadratic residue
which makes the message certification and identification more efficient and fast in database authentication and identification; the ultra-lightweight bit replacement operations and XOR encryption communication information was introduced
which reduces the cost of system computing; in database
the random number checking mechanism was added to avoid attacks such as agreement to be synchronized and denial of service attacks; finally
the GNY logical proof of the protocol was given
which shows the feasibility of the improved protocol.The protocol security and performance analysis indicate that the improved protocol has higher security and lower cost.
张平 , 李建武 , 冯志勇 , 等 . 认知无线网络基础理论与关键技术研究 [J ] . 电信科学 , 2014 , 30 ( 2 ): 1 - 13 .
ZHANG P , LI J W , FENG Z Y , et al . Research on basic theory and key technology of cognitive radio network [J ] . Telecommunications Science , 2014 , 30 ( 2 ): 1 - 13 .
李荣荣 , 寇建涛 , 董刚 , 等 . 面向智慧园区的RFID系统信息安全认证方案 [J ] . 电信科学 , 2016 , 32 ( 2 ): 164 - 169 .
LI R R , KOU J T DONG G , et al . A security authentication scheme in RFID system for smart park [J ] . Telecommunications Science , 2016 , 32 ( 2 ): 164 - 169 .
轩秀巍 , 膝建辅 , 自煜 . 基于二次剩余的增强型RFID认证协议 [J ] . 计算机工程 , 2012 , 38 ( 3 ): 123 - 125 .
XUAN X W , XI J F , ZI Y . Enhanced RFID authentication protocol based on quadratic residue [J ] . Computer Engineering , 2012 , 38 ( 3 ): 123 - 125 .
DOSS R , ZHOU W L , YU S . Secure RFID tag ownership transfer based on quadratic residues [J ] . IEEE Transactions on Information Forensics and Security , 2013 , 8 ( 2 ): 390 - 401 .
高利军 . 无线射频识别系统安全认证协议研究 [D ] . 天津:天津大学 , 2015 : 70 - 71 .
GAO L J . Research on security authentication protocol for radio frequency identification system [D ] . Tianjin:Tianjin University , 2015 : 70 - 71 .
VAIDYA B , MAKRAKIS D , MOUFTAH H T . Authentication mechanism for mobile RFID based smart grid network [C ] // Electrical and Computer Engineering(CCECE),May 4-7,2014,Toronto,ON,Canada . Piscataway:IEEE Press , 2014 : 1 - 6 .
裴小强 , 卫宏儒 . 基于Hash链的RFID安全双向认证协议 [J ] . 计算机应用 , 2014 , 34 ( S1 ): 47 - 49 .
PEI X Q , WEI H R . RFID mutual security authentication protocol based on Hash-chain [J ] . Journal of Computer Applications , 2014 , 34 ( S1 ): 47 - 49 .
NIU B , ZHU X , CHI H , et al . Privacy and authentication protocol for mobile RFID systems [J ] . Wireless Personal Communications , 2014 , 77 ( 3 ): 1713 - 1731 .
寇红召 , 张紫楠 , 马骏 . 基于物理不可隆函数的RFID双向认证 [J ] . 计算机工程 , 2013 , 39 ( 6 ): 142 - 145 .
KOU H Z , ZHANG Z N , MA J . RFID bi-directional authentication based on physical immovable function [J ] . Computer Engineering , 2013 , 39 ( 6 ): 142 - 145 .
王超 . 超轻量级 RFID 认证协议研究与实现 [D ] . 南京:南京航空航天大学 , 2014 .
WANG C . Research and implementation of super lightweight RFID authentication protocol [D ] . Nanjing:Nanjing University of Aeronautics & Astronautics , 2014 .
CHEN Y L , CHOU J S , SUN H M . A novel mutual authentication scheme based on quadratic residues for RFD systems [J ] . Computer Networks , 2008 , 52 ( 12 ): 2373 - 2380 .
YEH T C , WU C H , TSENG Y M . Improvement of the RFID authentication scheme based on quadratic residues [J ] . Computer Communications , 2011 , 34 ( 3 ): 337 - 341 .
IMPLIED E OR , THIS T , IS D , et al . Specification for RFID air interface EPC “radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860MHz-960MHz [EB ] . 2013 .
ZHOU J . A quadratic residue-based lightweight RFID mutual authentication protocol with constant-time identification [J ] . Journal of Communications , 2015 , 10 ( 2 ): 117 - 123 .
周治平 , 张惠根 . 一种更具实用性的移动 RFID 认证协议 [J ] . 传感技术学报 , 2016 , 29 ( 2 ): 271 - 277 .
ZHOU Z P , ZHANG H G . A more practical mobile RFID authentication protocol [J ] . Chinese Journal of Sensors and Actuators , 2016 , 29 ( 2 ): 271 - 277 .
马巧梅 . 基于 HMAC 的轻量级 RFID 认证协议 [J ] . 微处理机 , 2015 , 5 ( 4 ): 27 - 31 .
MA Q M . A HMAC-based RFID lightweight authentication protocol [J ] . Microprocessors , 2015 , 5 ( 4 ): 27 - 31 .
杜宗印 , 章国安 , 袁红林 . 基于位替换运算的RFID双向认证协议 [J ] . 电视技术 , 2013 , 37 ( 19 ): 134 - 137 .
DU Z Y , ZHANG G A , YUAN H L . Bits substitution based on RFID mutual authentication protocol [J ] . Video Engineering , 2013 , 37 ( 19 ): 134 - 137 .
侯峻峰 , 黄连生 . 安全协议形式化验证方法和安全协议设计研究 [D ] . 北京:清华大学 , 2004 .
HOU J F , HUANG L S . Research on formal verification method and security protocol design for security protocol [D ] . Beijing:Tsinghua University , 2004 .
王崇霞 , 高美真 , 刘倩 , 等 . 混合云联合身份认证与密钥协商协议设计 [J ] . 电信科学 , 2014 , 30 ( 4 ): 95 - 99 ,108.
WANG C X , GAO M Z , LIU Q , et al . Design of united identity authentication and key agreement protocol for hybrid cloud [J ] . Telecommunications Science , 2014 , 30 ( 4 ): 95 - 99 ,108.
0
浏览量
643
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构