期刊文献+

RFID认证协议ULAP的被动攻击分析 被引量:4

Analysis of Passive Attack on RFID Authentication Protocol ULAP
下载PDF
导出
摘要 无线射频识别(RFID)系统的双向认证机制可以有效地保护标签的机密性。对超轻量级RFID认证协议(ULAP)的安全性进行分析,结果表明,通过侦听多轮(预期值为10)阅读器和标签认证消息,就能推导出标签的全部秘密信息,因此ULAP协议不能抵抗被动攻击。 Mutual authentication mechanisms can be used in Radio Frequency Identification(RFID) systems to preserve the confidentiality of the RFID tags. In this paper, a passive attack is presented on a mutual RFID authentication protocol--ULAP(Ultra Light-weight Authentication Protocol), which is designed to resist passive attack. The attack shows that after eavesdropping a few numbers of round communication(expected number is 10), all the secret of the tag can be deduced. Therefore, ULAP can not resist passive attack.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第22期17-19,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60903181) 南京邮电大学校基金资助项目(NY208072)
关键词 无线射频识别 双向认证 超轻量级 被动攻击 Radio Frequency Identification(RFID) mutual authentication ultra light weight passive attack
  • 相关文献

参考文献8

  • 1Juels A. RFID Security and Privacy: A Research Survey[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394.
  • 2袁署光,戴宏跃,赖声礼.基于Hash函数的RFID认证协议[J].计算机工程,2008,34(12):141-143. 被引量:18
  • 3Vajda I, Buttyan L. Light Weight Authentication Protocols for Low-cost RFID Tags[C]//Proc. of Workshop on Security in Ubiquitous Computing. Goteborg, Sweden: [s. n.], 2003.
  • 4Juels A. Minimalist Cryptography for Low-cost RFID Tags[C]//Proc. of the 4th International Conference on Security in Communication Networks. [S. l]: Springer Press, 2004: 149-164.
  • 5Peris-Lopez P, CHernandez-Castro J, Estevez-Tapiador J, et al. LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID Tags[C]//Proc. of the 2nd Workshop on RFID Security. [S. l.]: IEEE Press, 2006.
  • 6Barasz M, Boros B, Ligeti R et al. Breaking LMAP[C]//Proc. of RFIDSec'07. [S. l.]: IEEE Press, 2007:11-16.
  • 7Barasz M, Boros B, Ligeti P, et al. Passive Attack Against the M2AP Mutual Authentication Protocol for RFID Tags[C]//Proc. of the 1st International EURASIP Workshop on RFID Technology. [S. l.]: IEEE Press, 2007: 76-83.
  • 8Peris-Lopez P, CHernandez-Castro J, Estevez-Tapiador J, et al. An Ultra Light Authentication Protocol Resistant to Passive Attacks Under the Gen-2 Specification[J]. Journal of Information Science and Engineering, 2009, 25(2): 33-57.

二级参考文献4

  • 1Osaka K, Takagi T. An Efficient and Secure RFID Security Method with Ownership Transfer[C]//Proc. of Computational Intelligence and Security. Guangzhou, China: [s. n.], 2006: 1090-1095.
  • 2Hun-Wook K, Shu-Yun L, Hoon-Jae L. Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security[C]//Proc. of Conference on Hybrid Information Technology. Cheju Island, Korea: [s. n.], 2006: 718-723.
  • 3Zhang Lan, Zhou Huaibei, Kong Ruoshan. An Improved Approach to Security and Privacy of RFID Application System[C]//Proc. of Wireless Communications, Networking and Mobile Computing Conference. Wuhan, China: [s. n.], 2005: 1195-1198.
  • 4Dimitriou T. A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks[C]//Proc. of Conference on Security and Privacy for Emerging Areas in Communications Networks. Athens, Greece: [s. n.], 2005: 59-66.

共引文献17

同被引文献41

  • 1Rhee K,Kwak J,Kim S,et al.Challenge-response Based RFID Authentication Protocol for Distributed Database Environ-ment[C] //Proc.of International Conference on Security in Pervasive Computing.Boppard,Germany:Springer-Verlag,2005.
  • 2Juels A,Weis S.Define Strong Privacy for Privacy RFID[C] //Proc.of the 5th Annual IEEE International Conference on Pervasive Computing and Communications.[S.l.] :IEEE Press,2007:342-347.
  • 3Bresson E,Chevassut O,Pointcheval D.New Security Results on Encrypted Key Exchange[C] //Proc.of the 7th International Workshop on Theory and Practice in Public Key Cryptography.Berlin,Germany:Springer-Verlag,2004:145-148.
  • 4Feldhofer M,Dominikus S,Wolkerstorfer J.Strong Authentication for RFID Systems Using the AES Algorithm[C] //Proc.of Workshop on Cryptographic Hardware and Embedded Systems.Boston,USA:Springer-Verlag,2004:357-370.
  • 5Molnar D,Wagner D.Privacy and Security in Library RFID:Issues,Practices,and Architectures[C] //Proc.of Conference on Computer and Communications Security.Washington D.C.,USA:ACM Press,2004:210-219.
  • 6Song B,Mitchell C.RFID Authentication Protocol for Low-cost Tags[C] //Proc.of the 1st ACM Conference on Wireless Network Security.New York,USA:ACM Press,2008:40-147.
  • 7Chen Yalin,Chou Jue-Sam,Sun Hung-Min.A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems[J].International Journal of Computer and Tele-communications Networking,2008,52(12):2373-2380.
  • 8Cao Tianjie,Shen Peng.Cryptanalysis of Some RFID Authenti-cation Protocols[J].Journal of Communications,2008,3(7):20-27.
  • 9Victor Shoup.Sequences of Games:A Tool for Taming Complexity in Security Proofs[EB/OL].(2006-01-18).http://eprint.iacr.org/2004/332.
  • 10Juels A. RFID Security and Privacy: A Research Survey[J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2): 381- 394.

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部