浏览全部资源
扫码关注微信
1. 广东司法警官职业学院信息管理系,广东 广州 510006
2. 广东工业大学计算机学院,广东 广州 510006
[ "占善华(1987-),男,广东司法警官职业学院信息管理系讲师,广东工业大学计算机学院博士生,主要研究方向为人工智能、机器学习、信息安全。" ]
[ "黄少荣(1976-),女,广东司法警官职业学院信息管理系教授,主要研究方向为计算智能。" ]
网络出版日期:2018-12,
纸质出版日期:2018-12-20
移动端阅览
占善华, 黄少荣. 一种基于字合成运算的射频识别双向认证协议[J]. 电信科学, 2018,34(12):65-70.
Shanhua ZHAN, Shaorong HUANG. A bidirectional authentication protocol for RFID based on Syn[J]. Telecommunications science, 2018, 34(12): 65-70.
占善华, 黄少荣. 一种基于字合成运算的射频识别双向认证协议[J]. 电信科学, 2018,34(12):65-70. DOI: 10.11959/j.issn.1000-0801.2018300.
Shanhua ZHAN, Shaorong HUANG. A bidirectional authentication protocol for RFID based on Syn[J]. Telecommunications science, 2018, 34(12): 65-70. DOI: 10.11959/j.issn.1000-0801.2018300.
RFID系统由标签、读写器、后台数据库3部分组成,其中标签与读写器之间通过无线信道进行信息传输,存在易被攻击者截获通信信息的风险。提出一种基于字合成运算的射频识别双向认证协议。所提协议运用二次剩余定理对信息进行加密,增大破解难度;每轮通信加密过程中,随机数的添加使得前后通信消息均不一致,致使攻击者无法发起追踪攻击行为信消息加密过程中,同时采用字合成运算方法,能够有效减少RFID系统总的计算量;后台数据库端引入随机数校验机制,使系统能够有效抵抗异步攻击等攻击。安全性分析表明,基于字合成运算的射频识别双向认证协议具备较高的安全性;性能分析表明,协议具备轻行为量级计算量的标准。
The RFID system is made up of three parts:tags
readers and databases.The information between tags and readers are transmitted through wireless channel
which is easy to be intercepted by attackers.A two-way authentication protocol based on word Synthesis operation was proposed.The two remainder theorem was used to encrypt communication messages by the proposed protocol
the difficulty of cracking was increased; In the process of each round of communication encryption
a random number was added to make the communication messages inconsistent
so that the tracking attacks could not be initiated by attackers.In the communication message encryption
the word synthesis algorithms was adopted at the same time
the total calculation of the system could be effectively reduced.A random checking mechanism was introduced at the database
enabling a synchronous attack and other attacks to be effectively resisted by the system.Security analysis shows that the protocol has high security
and performance analysis shows that the protocol has the standard of lightweight computation.
赵明慧 , 张琭 , 亓晋 . 基于区块链的社会物联网可信服务管理框架 [J ] . 电信科学 , 2017 , 33 ( 10 ): 19 - 25 .
ZHAO M H , ZHANG L , QI J . A framework of trusted services management based on block chain in social internet of things [J ] . Telecommunications Science , 2017 , 33 ( 10 ): 19 - 25 .
章谦骅 , 章坚武 , . 基于云安全技术的智慧政务云解决方案 [J ] . 电信科学 , 2017 , 33 ( 3 ): 107 - 111 .
ZHANG Q H , ZHANG J W , . Solution for smart government cloud based on cloud security technology [J ] . Telecommunications Science , 2017 , 33 ( 3 ): 107 - 111 .
吴震东 , 潘树诚 , 章坚武 . 基于CNN的连续语音说话人声纹识别 [J ] . 电信科学 , 2017 , 33 ( 3 ): 59 - 66 .
WU Z D , PAN S C , ZHANG J W . Continuous speech speaker recognition based on CNN [J ] . Telecommunications Science , 2017 , 33 ( 3 ): 59 - 66 .
裘华东 , 涂莹 , 丁麒 . 基于标签库系统的电力企业客户画像构建与信用评估及电费风险防控应用 [J ] . 电信科学 , 2017 , 33 ( Z1 ): 206 - 213 .
QIU H D , XU Y , DING Q . Customer portrait construction and credit evaluation of electric power enterprise based on tag library system and the application of electricity bill risk prevention and control [J ] . Telecommunications Science , 2017 , 33 ( Z1 ): 206 - 213 .
ALOMAIR B , CUELLAR J , POOVENDRAN R . Scalable RFID systems:a privacy-preserving protocol with constant time identification [J ] . IEEE Transactions on Parallel and Distributed Systems , 2012 , 23 ( 8 ): 1 - 10 .
刘道微 , 凌捷 , 杨昕 . 一种改进的满足后向隐私的RFID认证协议 [J ] . 计算机科学 , 2016 , 43 ( 8 ): 128 - 130 .
LIU D W , LING J , YANG X . Improved RFID authentication protocol with backward privacy [J ] . Computer Science , 2016 , 43 ( 8 ): 128 - 130 .
裴小强 , 卫宏儒 . 基于Hash链的RFID安全双向认证协议 [J ] . 计算机应用 , 2014 , 34 ( S1 ): 47 - 49 .
PEI X Q , WEI H R . RFID mutual security authentication protocol based on Hash-chain [J ] . Journal of Computer Applications , 2014 , 34 ( S1 ): 47 - 49 .
NIU B , ZHU X , CHI H , et al . Privacy and authentication protocol for mobile RFID systems [J ] . Wireless Personal Communications , 2014 , 77 ( 3 ): 1713 - 1731 .
寇红召 , 张紫楠 , 马骏 . 基于物理不可隆函数的RFID双向认证 [J ] . 计算机工程 , 2013 , 39 ( 6 ): 142 - 145 .
KOU H Z , ZHANG Z N , MA J . RFID mutual authentication based on physical unclonable function [J ] . Computer Engineering , 2013 , 39 ( 6 ): 142 - 145 .
王超 . 超轻量级 RFID 认证协议研究与实现 [D ] . 南京:南京航空航天大学 , 2014 .
WANG C . Research and implementation of ultra-lightweight RFID authentication protocol [D ] . Nanjing:Nanjing University of Aeronautics and Astronautics , 2014 .
杜宗印 , 章国安 , 袁红林 . 基于位替换运算的RFID双向认证协议 [J ] . 电视技术 , 2013 , 37 ( 19 ): 134 - 137 .
DU Z Y , ZHANG G A , YUAN H L . Bits substitution based on RFID mutual authentication protocol [J ] . Video Engineering , 2013 , 37 ( 19 ): 134 - 137 .
CHEN Y L , CHOU J S , SUN H M . A novel mutual authentication scheme based on quadratic residues for RFID systems [J ] . Computer Networks , 2008 , 52 ( 12 ): 2373 - 2380 .
YEH T C , WU C H , TSENG Y M . Improvement of the RFID authentication scheme based on quadratic residues [J ] . Computer Communications , 2011 , 34 ( 3 ): 337 - 341 .
轩秀巍 , 膝建辅 , 自煜 . 基于二次剩余的增强型RFID认证协议 [J ] . 计算机工程 , 2012 , 38 ( 3 ): 123 - 125 .
XUAN X W , XI J F , ZI Y . Enhanced RFID authentication protocol based on quadratic residue [J ] . Computer Engineering , 2012 , 38 ( 3 ): 123 - 125 .
DOSS R , ZHOU W L , YU S . Secure RFID tag ownership transfer based on quadratic residues [J ] . IEEE Transactions on Information Forensics and Security , 2013 , 8 ( 2 ): 390 - 401 .
ZHOU J . A quadratic residue-based lightweight RFID mutual authentication protocol with constant-time identification [J ] . Journal of Communications , 2015 , 10 ( 2 ): 117 - 123 .
周治平 , 张惠根 . 一种更具实用性的移动 RFID 认证协议 [J ] . 传感技术学报 , 2016 , 29 ( 2 ): 271 - 277 .
ZHOU Z P , ZHANG H G . A more practical mobile RFID authentication protocol [J ] . Chinese Journal of Sensors and Actuators , 2016 , 29 ( 2 ): 271 - 277 .
XIE R , JIAN B Y , LIU D W . An improved ownership transfer for RFID protocol [J ] . International Journal of Network Security , 2018 , 20 ( 1 ): 149 - 156 .
MAMUN M S I , MIYAJI A , RAHMAN M S . A secure and private RFID authentication protocol under SLPN problem [C ] // 6th International Conference on Network and System Security,November 21-23,2012,Fujian,China . Berlin:Springer , 2012 : 476 - 489 .
GODOR G , IMRE S . Hash-based mutual authentication protocol for low-cost RFID systems [C ] // 18th EUNICE Conference on Information and Communications Technologies,August 11-12,2012,Wuhan,China . Berlin:Springer , 2012 : 76 - 87 .
0
浏览量
335
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构