浏览全部资源
扫码关注微信
1. 苏州农业职业技术学院智慧农业学院,江苏 苏州 215008
2. 扬州大学信息工程学院,江苏 扬州 225127
[ "邓文雯(1983-),女,苏州农业职业技术学院智慧农业学院讲师,主要研究方向为计算机应用技术、物联网技术。" ]
[ "孙成明(1973-),男,博士,扬州大学信息工程学院教授、硕士生导师,主要研究方向为作物系统模拟与图像识别、作物精准栽培与农业信息技术、气候变化与碳源汇机理及其估算。" ]
[ "秦培亮(1981-),男,苏州农业职业技术学院智慧农业学院副教授,主要研究方向为复合传动及机械设计制造。" ]
网络出版日期:2018-10,
纸质出版日期:2018-10-20
移动端阅览
邓文雯, 孙成明, 秦培亮. 基于伪随机函数的RFID系统双向认证协议[J]. 电信科学, 2018,34(10):96-103.
Wenwen DENG, Chengming SUN, Peiliang QIN. A bidirectional authentication protocol for mobile RFID system based on PRF[J]. Telecommunications science, 2018, 34(10): 96-103.
邓文雯, 孙成明, 秦培亮. 基于伪随机函数的RFID系统双向认证协议[J]. 电信科学, 2018,34(10):96-103. DOI: 10.11959/j.issn.1000-0801.2018229.
Wenwen DENG, Chengming SUN, Peiliang QIN. A bidirectional authentication protocol for mobile RFID system based on PRF[J]. Telecommunications science, 2018, 34(10): 96-103. DOI: 10.11959/j.issn.1000-0801.2018229.
移动RFID系统中,读写器与后台数据库之间不再通过有线方式通信,而采用无线方式通信,但也存在一定的安全隐患问题。为确保通信数据的安全,提出一种基于伪随机函数的移动RFID双向认证协议。协议确保标签、读写器、后台数据库三方均进行认证,从而保障通信的安全性;采用字合成等位运算,在一定程度上能够减少总的计算量;三方认证,使得移动RFID系统具备更为广泛的运用价值。安全性及性能分析表明,所提协议具有较高的安全性及较低的成本。
In mobile RFID system
the reader and the database no longer communicate through the wired way
but communicate wirelessly
so there are also some potential safety issues.In order to ensure the safety of communication data
a mobile RFID bidirectional authentication protocol based on pseudo-random function was proposed.The protocol ensured the tripartite entities:the tag
the reader and the database
was authenticated each other
and thereby ensured the security of communication.The use of word synthesis operation to a certain extent
could be used to reduce the total amount of computation.The mobile RFID systems have more extensive using value by tripartite authentication; security analysis and performance analysis show that the proposed protocol has higher security and lower costs.
张平 , 李建武 , 冯志勇 , 等 . 认知无线网络基础理论与关键技术研究 [J ] . 电信科学 , 2014 , 30 ( 2 ): 1 - 13 .
ZHANG P , LI J W , FENG Z Y , et al . Research on basic theory and key technology of cognitive radio network [J ] . Telecommunications Science , 2014 , 30 ( 2 ): 1 - 13 .
MUNILLA J , BURMESTER M , PEINADO A , et al . RFID ownership transfer with positive secrecy capacity channels [J ] . Sensors , 2017 , 17 ( 1 ): 53 - 70 .
CHIOU S Y , KO W T , LU E H . A secure ECC-based mobile RFID mutual authentication protocol and its application [J ] . International Jouranl of Network Security , 2018 , 20 ( 2 ): 396 - 402 .
BURMESTER M , MUNILLA J , ORTIZ A , et al . An RFID-based smart structure for the supply chain:resilient scanning proofs and ownership transfer with positive secrecy capacity channels [J ] . Sensors , 2017 , 17 ( 7 ): 1562 - 1581 .
LI X D , ZHOU C L , XU N . A secure and efficient image encryption algorithm based on DNA coding and spatiotemporal chaos [J ] . International Journal of Network Security , 2018 , 20 ( 1 ): 110 - 120 .
冯剑 , 王平阳 , 王琳 , 等 . 基于能量获取的无线通信系统研究 [J ] . 电信科学 , 2015 , 31 ( 2 ): 124 - 131 .
FENG J , WANG P Y , WANG L , et al . Research on energy harvesting communication system [J ] . Telecommunications Science , 2015 , 31 ( 2 ): 124 - 131 .
周恒 , 畅志贤 , 杨武军 , 等 . 一种5G网络切片的编排算法 [J ] . 电信科学 , 2017 , 33 ( 8 ): 130 - 137 .
ZHOU H , CHANG Z X , YANG W J , et al . An orchestration algorithm of 5G network slicing [J ] . Telecommunications Science , 2017 , 33 ( 8 ): 130 - 137 .
ZHOU J . A quadratic residue-based lightweight RFID mutual authentication protocol with constant-time identification [J ] . Journal of Communications , 2015 , 10 ( 2 ).
QIAN Q , JIA Y L , ZHANG R . A lightweight RFID security protocol based on elliptic curve cryptography [J ] . International Journal of Network Security , 2016 , 18 ( 2 ): 354 - 361 .
NOUREDDINE C , FOUDIL C , CAYREL P L , et al . Improved RFID authentication protocol based on randomized McEliece cryptosystem [J ] . International Journal of Network Security , 2015 , 17 ( 4 ): 413 - 422 .
XIE R , JIAN B Y , LIU D W . An improved ownership transfer for RFID protocol [J ] . International Journal of Network Security , 2018 , 20 ( 1 ): 149 - 156 .
YEH T C , WU C H , TSENG Y M . Improvement of the RFID authentication scheme based on quadratic residues [J ] . Computer Communications , 2011 , 34 ( 3 ): 337 - 341 .
庞晓丹 , 李薇薇 , 孙茜 , 等 . LTE无线网络虚拟化中切片调度策略 [J ] . 电信科学 , 2017 , 33 ( 2 ): 66 - 72 .
PANG X D , LI W W , SUN Q , et al . Slice scheduling strategy in LTE wireless network virtualization [J ] . Telecommunications Science , 2017 , 33 ( 2 ): 66 - 72 .
TIAN Y , CHEN G L , LI J H . A new ultra-lightweight RFID authentication protocol with permutation [J ] . IEEE Communications Letters , 2012 , 16 ( 5 ): 702 - 705 .
0
浏览量
589
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构