计算机科学 ›› 2016, Vol. 43 ›› Issue (4): 160-162.doi: 10.11896/j.issn.1002-137X.2016.04.032
杨昕,凌捷
YANG Xin and LING Jie
摘要: 针对射频识别系统存在的安全问题和成本问题,提出了一种低成本超轻量级RFID双向认证协议。采用BAN逻辑形式化证明方法对协议进行了形式化证明,并进行了安全性分析,结果表明本协议能够有效抵抗拒绝服务攻击、去同步化攻击、假冒攻击等多种恶意攻击,具有安全性较好、成本低和需要的运算与存储资源少等优点。
[1] Zhou Y B,Feng D G.Design and Analysis of Cryptographic Protocols for RFID[J].Chinese Journal of Computers,2006,9(4):581-589(in Chinese) 周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,9(4):581-589 [2] Sun H M,Ting W C.A Gen2-based RFID authentication protocol for security and privacy[J].IEEE Trans Mob Comput,2009,8(8):1052-1062 [3] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.LMAP:A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags[C]∥Proceedings of the 2nd Workshop on RFID Security.New Jersey,USA:IEEE Press,2006:137-148 [4] Chien H Y.SASI:A New Ultra-lightweight RFID Authentication Protocol Providing Strong Authentication and Strong Intergrity[J].IEEE Trans.Dependable and Secure Computing,2007,4(4):337-340 [5] Bagheri N,Safkhani M,Naderi M,et al.Security Analysis ofLMAP++,an RFID Authentication Protocol[C]∥Abu Dhabi.6th International Conference on Internet Technology and Secured Transactions.2011:689-694 [6] Phan R C W.Cryptanalysis of a New Ultralightweight RFIDAuthentication Protocol—SASI[J].IEEE Trans.on Dependable and Secure Computing,2009,6(4):316-320 [7] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.Advances in Ultra-Lightweight Cryptography for Low-cost RFID Tags:Gossamer Protocol[C]∥9th International Workshop on Information Security Applications.2009:56-68 [8] Peng P,Zhao Y M,Han W L,et al.Ultra-lightweight RFID Mutual Authenticaiton Protocol[J].Computer Engineering,2011,7(16):140-142(in Chinese) 彭朋,赵一鸣,韩伟力,等.一种超轻量级RFID双向认证协议[J].计算机工程,2011,7(16):140-142 [9] Du Z Y,Zhang G A,Yuan H L.Crossover Based Ultra-light-weight RFID Authentication Protocol[J].Computer Science,2013,0(11):35-37(in Chinese) 杜宗印,章国安,袁红林.基于交叉位运算的超轻量RFID认证协议[J].计算机科学,2013,0(11):35-37 [10] Gao L J,Ma M D,Shu Y T,et al.An ultralightweight RFID authentication protocol with CRC and permutation[J].Journal of Network and Computer Applications,2014,1:37-46 [11] Yang S P.Analysis and Research of Security Protocol with BAN Logic[D].Guiyang:Guizhou University,2007:54-7 3(in Chinese) 杨世平.安全协议及其BAN逻辑分析研究[D].贵阳:贵州大学,2007:54-73 [12] Tian Y,Chen G L,Li J H.A new ultralightweight RFID authentication protocol with permutation[J].Communications Letters IEEE ,2012,6(5):702-705 |
No related articles found! |
|