计算机科学 ›› 2017, Vol. 44 ›› Issue (2): 206-208.doi: 10.11896/j.issn.1002-137X.2017.02.033

• 信息安全 • 上一篇    下一篇

一种新的轻量级RFID双向认证协议

柳毅,顾国生   

  1. 广东工业大学计算机学院 广州510006,广东工业大学计算机学院 广州510006
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受国家自然科学基金项目(61572144),广东省自然科学基金项目(2014A030313517),广东省科技计划项目(2013B040500009)资助

New Mutual Authentication for Lightweight RFID Protocols

LIU Yi and GU Guo-sheng   

  • Online:2018-11-13 Published:2018-11-13

摘要: RFID技术是一种广泛应用于各种物体识别和跟踪的自动识别技术,它适用于多个领域。然而,设计出一个安全的轻量级的RFID认证协议是一项具有挑战性的任务。最近Kulseng等人提出了一种轻量级RFID认证协议,该协议采用物理不可克隆技术和线性反馈移位寄存器来实现,非常适合轻量级操作。分析发现,该协议存在几个严重的安全问题。在分析上述协议的基础上,提出了一种新的轻量级RFID双向认证协议。分析表明,新协议在保持轻量级操作的同时,具有更好的安全性和保密性。

关键词: RFID,轻量级,物理不可克隆函数,线性反馈移位寄存器,双向认证

Abstract: Radio frequency identification (RFID) technology is an automated identification technology which is widely used to identify and track all kind of objects.It is well suitable for many fields.However,it is a challenging task to design an authentication protocol because of the limited resource of lightweight RFID tags.Recently,a lightweight RFID authentication protocol of RFID tags were presented by Kulseng et al.This protocol uses physically unclonable functions (PUFs) and linear feedback shift registers (LFSRs) which are well known for lightweight operations.Unfortunately,their protocols face several serious security issues.In this paper,based on PUFs and LFSRs,we suggested a new mutual authentication for low-cost RFID Systems.Security analysis shows that our protocol owns better security and privacy.

Key words: RFID,Lightweight,PUF,LFSR,Mutual authentication

[1] ZHOU S J,ZHANG W Q,LUO J Q.Overview of radio frequency identification (RFID) privacy protection technology [J].Journal of Software,2015,6(4):960-976.(in Chinese) 周世杰,张文清,罗嘉庆.射频识别(RFID)隐私保护技术综述[J].软件学报,2015,6(4):960-976.
[2] JIN Y M,WU Q Y,SHI Z Q,et al.RFID Lightweight Authentication Protocol Based on PRF[J].Journal of Computer Research and Development,2014,51(7):1506-1514.(in Chinese) 金永明,吴棋滢,石志强,等.基于PRF的RFID轻量级认证协议研究[J].计算机研究与发展,2014,1(7):1506-1514.
[3] LU L.Wireless Key Generation for RFID System[J].Chinese Journal of Computers,2015,38(4):822-832.(in Chinese) 鲁力.RFID系统密钥无线生成[J].计算机学报,2015,8(4):822-832.
[4] WANG L M,YI X L,LV C,et al.Security Improvement in Authentication Protocol for Gen-2 Based RFID System[J].JCIT,2011,6(1):157-169.
[5] ZHANG J S,WANG W D,MA J,et al.A Novel Authentication Protocol suitable to EPC Class 1 Generation 2 RFID system[J].JCIT,2012,7(3):259-266.
[6] AVOINE G,LAURADOUX C,MARTIN T.When Compro-mised Readers Meet RFID[C]∥Workshop on Information Security Applications(WISA’09).2009:36-50.
[7] LU L,HAN J,HU L,et al.Dynamic key-updating:Privacy-preserving authentication for rfid systems[C]∥Fifth Annual IEEE International Conference on Pervasive Computing and Communications.2007:13-22.
[8] SONG B,MITCHELL C J.RFID authentication protocol forlow-cost tags[C]∥Proceedings of the First ACM Conference on Wireless Network Security.2008:140-147.
[9] LO N W,YEH K H.An efficient mutual authentication schemefor epcglobal class-1 generation-2 rfid system[C]∥Proceedings of the 2007 Conference on Emerging Direction in Embedded and Ubiquitous Computing.2007:43-56.
[10] ALOMAIR B,CUELLAR J,POOVENDRAN R.Scalable RFID systems:A privacy-preserving protocol with constant time identification [J].IEEE Trans on Parallel and Distributed Systems,2012,3(8):1-10.
[11] GODOR G,IMRE S.Hash-based mutual authentication protocol for low-cost RFID systems[C]∥Proc of the 18th EUNICE Conf on Information and Communications Technologies.Berlin:Springer,2012:76-87.
[12] MAMUN M S I,MOUAKJI A,RAHMAN M S.A secure and private RFID authentication protocol under SLPN problem[C]∥Proc of the 6th Int Conf on Network and System Security.Berlin:Springer,2012:476-489.
[13] WANG S H,LIU S J,CHEN D W.Scalable RFID Mutual Authentication Protocol with Backward Privacy[J].Journal of computer Research and Development,2013,0(6):1276-1284.(in Chinese) 王少辉,刘素娟,陈丹伟.满足后向隐私的可扩展RFID双向认证方案[J].计算机研究与发展,2013,0(6):1276-1284.
[14] BOLOTNYY L,ROBINS G.Physically unclonable function-based security and privacy in RFID systems[C]∥Fifth Annual IEEE International Conference on Pervasive Computing and Communications .2007:211-220.
[15] KULSENG L,YU Z,WEI Y,et al.Lightweight mutual authentication and ownership transfer for rfid systems[C]∥Procee-dings of the 29th Conference on Information Communications.2010:251-255.
[16] KARDAS S,AKGUN M,KIRAZ M S,et al.Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems[C]∥Workshop on Lightweight Security & Privacy:Devices,Protocols,and Applications.2011:20-25.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!