计算机科学 ›› 2019, Vol. 46 ›› Issue (1): 182-189.doi: 10.11896/j.issn.1002-137X.2019.01.028
李璐璐, 董庆宽, 陈萌萌
LI Lu-lu, DONG Qing-kuan, CHEN Meng-meng
摘要: 射频识别技术(Radio Frequency Identification,RFID)作为物联网中标识物品的关键技术,其因低成本、易携带等优势而得到了广泛的应用。基于云存储的RFID技术相较于传统RFID技术更具有应用市场,但其安全隐私问题也更为严重。另外,现有的很多群组标签认证协议不仅不符合轻量级要求,还具有密钥失同步的问题。文中提出一种基于云的轻量级RFID群组标签认证协议。该协议基于Hash函数而设计,它不仅解决了上述安全隐患,还能在群组认证过程中筛除无效标签和假冒标签。最后,利用BAN逻辑对该协议进行了分析。安全目标分析表明,该协议可以抗多重DOS攻击以及其他基本攻击,并满足前向安全性。
中图分类号:
[1]ZHANG D Q,QIAN Y M,WAN J F,et al.An Efficient RFID Search Protocol Based on Clouds[J].Mobile Networks & Applications,2015,20(3):356-362.<br /> [2]WEIS S.Security and Privacy in Radio-frequency Identification Devices[D].Boston:Massachusetts Institute of Technology,2003.<br /> [3]TSUDIK G.YA-TRAP:yet another trivial RFID authentication protocol[C]//IEEE International Conference on Pervasive Computing and Communications Workshops.Italy,IEEE Computer Society,2006:640-643.<br /> [4]RHEE K,JIN K,KIM S,et al.Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment[J].Kips Transactions Partc,2005,3450(3):309-316.<br /> [5]YAN F,LIU B W,HUO L Y,et al.Research and Design of a Security Framework for RFID System[C]//International Forum on Information Technology and Applications.Beijing,IEEE Computer Society,2010:443-445.<br /> [6]XIAO H,ALSHEHRI A,CHRISTIANSON B.A Cloud-Based RFID Authentication Protocol with Insecure Communication Channels[C]//IEEE Trustcom/BigDatase/ISPA.IEEE,2017:332-339.<br /> [7]DA L M.Research on Information Security Technology of the Internet of Things at the Perceived Layers of RFID and WSN[J].Journal of Nanjing Institute of Industry Technology,2014(1):8-11.(in Chinese)<br /> 笪林梅.物联网感知层RFID和WSN信息安全技术研究[J].南京:工业技术学院学报,2014(1):8-11.<br /> [8]LEE C F,CHIEN H Y,LAIH C S.Server-less RFID authentication and searching protocol with enhanced security[J].International Journal of Communication Systems,2012,25(3):376-385.<br /> [9]HOQUE M E,RAHMAN F,AHAMED S I,et al.Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments[J].Wireless Personal Communications,2010,55(1):65-79.<br /> [10]ZHAN Y,SUN Y.Cloud Storage Management Technology [C]// International Conference on Information and Computing Scien-ce.2009:309-311.<br /> [11]BELLARE M,RAN C,KRAWCZYK H.H·:Keying Hash Functions for Message Authentication[M]//Advances in Cryptology——CRYPTO’96.Springer Berlin Heidelberg,1991.<br /> [12]GUO J,PEYRIN T,POSCHMANN A.The PHOTON Family of Lightweight Hash Functions[OL].http://www.reshaem.net/tasks/task_152522.pdf.<br /> [13]WEI X,LEI X,CHEN Z.Cloud-based RFID Authentication[C]// IEEE International Conference on RFID.2013:168-175.<br /> [14]DONG Q K,TONG J Q,CHEN Y.Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud[C]//International Journal of Distributed Sensor Networks.2015:1-9.<br /> [15]ZHENG J B.RFID mutual authentication protocol based on Cloud Server[J].Journal of Mudanjiang University,2016,25(7):152-154.(in China)<br /> 郑金彬.基于云服务器的RFID双向认证协议[J].牡丹江大学学报,2016,25(7):152-154.<br /> [16]KARDAS S,CELIK S,BINGOL M A,et al.A New Security and Privacy Framework for RFID in Cloud Computing[C]//IEEE International Conference on Cloud Computing Technology and Science.Bristol,UK,IEEE,2013:171-176.<br /> [17]GUO Y M,LI S D,CHEN Z H,et al.Alightweight privacy-preserving grouping proof protocol for RFID systems[J].Tien Tzu Hsueh Pao/acta Electronica Sinica,2015,43(2):289-292.<br /> [18]ZHANG R,ZHU L,XU C,et al.An Efficient and Secure RFID Batch Authentication Protocol with Group Tags Ownership Transfer[C]//Conference on Collaboration and Internet Computing.Hangzhou,China,IEEE,2015:168-175.<br /> [19]BURROWS M,ABADI M,NEEDHAM R M.A logic of authentication[J].Proceedings of the Royal Society A Mathematical Physical & Engineering Sciences,1989,426(1871):1-13. |
[1] | 罗文聪, 郑嘉利, 全艺璇, 谢孝德, 林子涵. 基于改进型多目标樽海鞘群算法的RFID阅读器天线优化部署 Optimized Deployment of RFID Reader Antenna Based on Improved Multi-objective Salp Swarm Algorithm 计算机科学, 2021, 48(9): 292-297. https://doi.org/10.11896/jsjkx.200700167 |
[2] | 段雯, 周良. 基于动态附加布隆过滤器的RFID数据冗余处理算法 Redundant RFID Data Removing Algorithm Based on Dynamic-additional Bloom Filter 计算机科学, 2021, 48(8): 41-46. https://doi.org/10.11896/jsjkx.200700093 |
[3] | 李丽, 郑嘉利, 罗文聪, 全艺璇. 基于近端策略优化的RFID室内定位算法 RFID Indoor Positioning Algorithm Based on Proximal Policy Optimization 计算机科学, 2021, 48(4): 274-281. https://doi.org/10.11896/jsjkx.200300028 |
[4] | 刘嘉琛, 秦小麟, 朱润泽. 基于LSTM-Attention的RFID移动对象位置预测 Prediction of RFID Mobile Object Location Based on LSTM-Attention 计算机科学, 2021, 48(3): 188-195. https://doi.org/10.11896/jsjkx.200600134 |
[5] | 徐鹤, 吴满星, 李鹏. 基于ARIMA模型的RFID室内相对位置定位算法 RFID Indoor Relative Position Positioning Algorithm Based on ARIMA Model 计算机科学, 2020, 47(9): 252-257. https://doi.org/10.11896/jsjkx.200400038 |
[6] | 李丽,郑嘉利,王哲,袁源,石静. 基于异步优势动作评价的RFID室内定位算法 RFID Indoor Positioning Algorithm Based on Asynchronous Advantage Actor-Critic 计算机科学, 2020, 47(2): 233-238. https://doi.org/10.11896/jsjkx.190100070 |
[7] | 侯培国, 王志轩, 严晨. 基于RFID标签的防碰撞算法改进 Improvement of Anti-collision Algorithm Based on RFID Tag 计算机科学, 2019, 46(11A): 359-362. |
[8] | 杨子薇, 郑嘉利, 岳世彬, 袁源, 石静. 基于标签分组的新型Q值防碰撞算法 New Q Value Anti-collision Algorithm Based on Label Grouping 计算机科学, 2018, 45(9): 152-155. https://doi.org/10.11896/j.issn.1002-137X.2018.09.024 |
[9] | 徐扬,苑津莎,高会生,赵振兵. 基于二次剩余理论的智能电表安全认证协议 Authentication Protocol for Smart Meter Based on Quadratic Residues 计算机科学, 2018, 45(7): 158-161. https://doi.org/10.11896/j.issn.1002-137X.2018.07.027 |
[10] | 殷秋实, 陈建华. 多服务器环境下基于椭圆曲线密码的改进的身份认证协议 Improved Identity Authentication Protocol Based on Elliptic Curve Cryptographyin Multi-server Environment 计算机科学, 2018, 45(6): 111-116. https://doi.org/10.11896/j.issn.1002-137X.2018.06.019 |
[11] | 刘耀宗, 刘云恒. 基于区块链的RFID大数据安全溯源模型 Security Provenance Model for RFID Big Data Based on Blockchain 计算机科学, 2018, 45(11A): 367-368. |
[12] | 章文斌,李二涛,李飞,李琰琰,朱艺华. 基于NAK的WISP数据传输方案 Negative Acknowledgement Based Data Delivery Scheme for WISP 计算机科学, 2017, 44(Z6): 294-299. https://doi.org/10.11896/j.issn.1002-137X.2017.6A.067 |
[13] | 贾宁. 面向智能终端的校园教育互联系统的研究与实现 Research and Implementation of Campus Education Interconnection System for Intelligent Terminal 计算机科学, 2017, 44(Z11): 573-576. https://doi.org/10.11896/j.issn.1002-137X.2017.11A.122 |
[14] | 关炀,闫国玉,王颖,蒋遂平. RFID室内实时定位系统的数据滤波方法 Data Filtration Method for RFID Based Indoor RTLS 计算机科学, 2017, 44(Z11): 293-296. https://doi.org/10.11896/j.issn.1002-137X.2017.11A.062 |
[15] | 宋岚,薛锦云,胡启敏,谢武平,江东明,游珍. 无线射频RFID识别协议自动验证方法研究 Research of Automatic Verification Method about Radio Frequency Identification Protocol 计算机科学, 2017, 44(9): 99-104. https://doi.org/10.11896/j.issn.1002-137X.2017.09.020 |
|