期刊文献+

基于Hash函数和排列的轻量级RFID安全认证协议 被引量:5

A Lightweight RFID Security Authentication Protocol Based on Hash Function and Arrangement
下载PDF
导出
摘要 针对无线射频识别(RFID)系统的安全性问题,提出一种新的基于Hash函数和排列的轻量级RFID认证协议.利用Hash函数的单向性解决RFID的安全隐私问题,使用一种称为排列的操作算子,结合XOR操作和密钥备份技术来提高协议的安全性能.通过简单进程元语言解释器(SPIN)工具进行验证.结果表明,该协议能够有效地抵御去同步、泄漏、追踪和重放攻击,且没有明显增加计算量.能够弥补已有基于Hash函数的认证协议中存在的安全缺陷,更适合低成本RFID系统的安全需求. For the security and privacy issues of RFID system,a new lightweight RFID authentication protocol based on hash function is proposed.The one-way Hash function is used to solve the RFID security and privacy issues,and integrates the arrangement operator,exclusive or(XOR)operation and the key backup technology to improve the safety performance of the protocol.Simple Promela Interpreter(SPIN)is used to verify the performance of the protocol,results show that the protocol can effectively resist the desynchronization,disclosure,tracing and replay attacks,and don't significantly increase the amount of computation.This protocol improves the security flaws existing in the current Hash-based operation authentication protocol,and it is suitable for the security requirement of the low cost RFID system.
出处 《湘潭大学自然科学学报》 CAS 北大核心 2016年第1期115-119,共5页 Natural Science Journal of Xiangtan University
基金 河南省高等学校重点项目(16A520083 16520010)
关键词 安全认证协议 射频识别 HASH函数 排列 抵御攻击 SPIN security authentication protocol radio frequency identification devices(RFID) Hash function arrangement resist attacks SPIN
  • 相关文献

参考文献6

二级参考文献58

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3The eSTREAM Portfolio[EB/OL]. [ 2008-04- 15 ]. http://www.ecrypt. eu. org/stream/portfolio. pdf.
  • 4HELL M. JOHANSSON T. MAXIMOV A.et al. A stream cipher proposal Grain- 128[R]. Seattle: IEEE International Symposium on In formation Theory. 2006:1614- 1618.
  • 5DINUR I, SHAMIR A. Breaking Grain-128 with dynamic cube attacks[R]. Lyngby: FSE. 2011.
  • 6GOOD T, BENAISSA M. Hardware results for selected stream cipher candidates[R]. Bochum: SASC. 200?.
  • 7AGREN M, HELL M, JOHANSSON T, et al. A new version of Grain- 128 with Authentication[R]. Lyngby: ECRYPT Workshop on Symmetric Encryption. 2011.
  • 8JUELS A, R/VEST R, SZYDLO M. The blocker tag: Selective blocking of RFID tags for consumer privacy[C]// Proceeding of the 8th ACM Conference on Computer and Communication Security. New York: ACM, 2003: 103-111.
  • 9PEDRO P L, JUL10 C H C, JUAN M, et al. RFID system: a survey on security threats and proposed solutions[J]. Lecture Notes in Computer Science, 2006, 42(17): 159-170.
  • 10SARMA S E, WEI S A, ENGLES D W. Radio-frequency identification: Security risks and challenges[J]. CryptoBytes Technical Newsletter from RSA Laboratories, 2003, 6(1): 2-9.

共引文献69

同被引文献27

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部