计算机科学 ›› 2019, Vol. 46 ›› Issue (1): 182-189.doi: 10.11896/j.issn.1002-137X.2019.01.028

• 信息安全 • 上一篇    下一篇

基于云的轻量级RFID群组标签认证协议

李璐璐, 董庆宽, 陈萌萌   

  1. (西安电子科技大学综合业务网国家重点实验室 西安710071)
  • 收稿日期:2017-12-20 出版日期:2019-01-15 发布日期:2019-02-25
  • 作者简介:李璐璐(1993-),女,硕士生,主要研究方向为信息安全,E-mail:992946641@qq.com;董庆宽(1973-),男,硕士生导师,主要研究方向为信息安全,E-mail:qkdong@mail.xidian.edu.cn(通信作者);陈萌萌(1993-),女,硕士生,主要研究方向为信息安全。
  • 基金资助:
    国家自然科学基金项目(61373172)资助

Cloud-based Lightweight RFID Group Tag Authentication Protocol

LI Lu-lu, DONG Qing-kuan, CHEN Meng-meng   

  1. (State Key Laboratory of Integrated Service Networks,Xidian University,Xi’an 710071,China)
  • Received:2017-12-20 Online:2019-01-15 Published:2019-02-25

摘要: 射频识别技术(Radio Frequency Identification,RFID)作为物联网中标识物品的关键技术,其因低成本、易携带等优势而得到了广泛的应用。基于云存储的RFID技术相较于传统RFID技术更具有应用市场,但其安全隐私问题也更为严重。另外,现有的很多群组标签认证协议不仅不符合轻量级要求,还具有密钥失同步的问题。文中提出一种基于云的轻量级RFID群组标签认证协议。该协议基于Hash函数而设计,它不仅解决了上述安全隐患,还能在群组认证过程中筛除无效标签和假冒标签。最后,利用BAN逻辑对该协议进行了分析。安全目标分析表明,该协议可以抗多重DOS攻击以及其他基本攻击,并满足前向安全性。

关键词: BAN逻辑, RFID, 轻量级认证协议, 群组认证, 云数据库

Abstract: As a key technology for indentifying objects in the Internet of Things (IoT),radio frequency identification (RFID) technology has been widely used because of its advantages,such as low cost and easy to carry.The RFID system based on cloud storage technology has a more widely application market comparing with the traditional RFID system,but its security and privacy issues are more serious.At the same time,many existing group authentication protocols don’t meet the lightweight requirements,and have the lost synchronization problem in key updating process.This paper proposed a cloud-based lightweight RFID tag group authentication protocol.This protocol is based on the Hash function,which not only resolves these issues above,but also filters out the invalid and fake labels.Finally,this paper conducted the formal analysis of the proposed protocol by using BAN logic.The security target analysis shows that the proposed protocol can resist the multi-DOS attack and other common attacks,and possesses the forward security.

Key words: BAN logic, Cloud database, Group authentication, Lightweight authentication protocol, RFID

中图分类号: 

  • TP393
[1]ZHANG D Q,QIAN Y M,WAN J F,et al.An Efficient RFID Search Protocol Based on Clouds[J].Mobile Networks & Applications,2015,20(3):356-362.<br /> [2]WEIS S.Security and Privacy in Radio-frequency Identification Devices[D].Boston:Massachusetts Institute of Technology,2003.<br /> [3]TSUDIK G.YA-TRAP:yet another trivial RFID authentication protocol[C]//IEEE International Conference on Pervasive Computing and Communications Workshops.Italy,IEEE Computer Society,2006:640-643.<br /> [4]RHEE K,JIN K,KIM S,et al.Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment[J].Kips Transactions Partc,2005,3450(3):309-316.<br /> [5]YAN F,LIU B W,HUO L Y,et al.Research and Design of a Security Framework for RFID System[C]//International Forum on Information Technology and Applications.Beijing,IEEE Computer Society,2010:443-445.<br /> [6]XIAO H,ALSHEHRI A,CHRISTIANSON B.A Cloud-Based RFID Authentication Protocol with Insecure Communication Channels[C]//IEEE Trustcom/BigDatase/ISPA.IEEE,2017:332-339.<br /> [7]DA L M.Research on Information Security Technology of the Internet of Things at the Perceived Layers of RFID and WSN[J].Journal of Nanjing Institute of Industry Technology,2014(1):8-11.(in Chinese)<br /> 笪林梅.物联网感知层RFID和WSN信息安全技术研究[J].南京:工业技术学院学报,2014(1):8-11.<br /> [8]LEE C F,CHIEN H Y,LAIH C S.Server-less RFID authentication and searching protocol with enhanced security[J].International Journal of Communication Systems,2012,25(3):376-385.<br /> [9]HOQUE M E,RAHMAN F,AHAMED S I,et al.Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments[J].Wireless Personal Communications,2010,55(1):65-79.<br /> [10]ZHAN Y,SUN Y.Cloud Storage Management Technology [C]// International Conference on Information and Computing Scien-ce.2009:309-311.<br /> [11]BELLARE M,RAN C,KRAWCZYK H.H·:Keying Hash Functions for Message Authentication[M]//Advances in Cryptology——CRYPTO’96.Springer Berlin Heidelberg,1991.<br /> [12]GUO J,PEYRIN T,POSCHMANN A.The PHOTON Family of Lightweight Hash Functions[OL].http://www.reshaem.net/tasks/task_152522.pdf.<br /> [13]WEI X,LEI X,CHEN Z.Cloud-based RFID Authentication[C]// IEEE International Conference on RFID.2013:168-175.<br /> [14]DONG Q K,TONG J Q,CHEN Y.Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud[C]//International Journal of Distributed Sensor Networks.2015:1-9.<br /> [15]ZHENG J B.RFID mutual authentication protocol based on Cloud Server[J].Journal of Mudanjiang University,2016,25(7):152-154.(in China)<br /> 郑金彬.基于云服务器的RFID双向认证协议[J].牡丹江大学学报,2016,25(7):152-154.<br /> [16]KARDAS S,CELIK S,BINGOL M A,et al.A New Security and Privacy Framework for RFID in Cloud Computing[C]//IEEE International Conference on Cloud Computing Technology and Science.Bristol,UK,IEEE,2013:171-176.<br /> [17]GUO Y M,LI S D,CHEN Z H,et al.Alightweight privacy-preserving grouping proof protocol for RFID systems[J].Tien Tzu Hsueh Pao/acta Electronica Sinica,2015,43(2):289-292.<br /> [18]ZHANG R,ZHU L,XU C,et al.An Efficient and Secure RFID Batch Authentication Protocol with Group Tags Ownership Transfer[C]//Conference on Collaboration and Internet Computing.Hangzhou,China,IEEE,2015:168-175.<br /> [19]BURROWS M,ABADI M,NEEDHAM R M.A logic of authentication[J].Proceedings of the Royal Society A Mathematical Physical & Engineering Sciences,1989,426(1871):1-13.
[1] 罗文聪, 郑嘉利, 全艺璇, 谢孝德, 林子涵.
基于改进型多目标樽海鞘群算法的RFID阅读器天线优化部署
Optimized Deployment of RFID Reader Antenna Based on Improved Multi-objective Salp Swarm Algorithm
计算机科学, 2021, 48(9): 292-297. https://doi.org/10.11896/jsjkx.200700167
[2] 段雯, 周良.
基于动态附加布隆过滤器的RFID数据冗余处理算法
Redundant RFID Data Removing Algorithm Based on Dynamic-additional Bloom Filter
计算机科学, 2021, 48(8): 41-46. https://doi.org/10.11896/jsjkx.200700093
[3] 李丽, 郑嘉利, 罗文聪, 全艺璇.
基于近端策略优化的RFID室内定位算法
RFID Indoor Positioning Algorithm Based on Proximal Policy Optimization
计算机科学, 2021, 48(4): 274-281. https://doi.org/10.11896/jsjkx.200300028
[4] 刘嘉琛, 秦小麟, 朱润泽.
基于LSTM-Attention的RFID移动对象位置预测
Prediction of RFID Mobile Object Location Based on LSTM-Attention
计算机科学, 2021, 48(3): 188-195. https://doi.org/10.11896/jsjkx.200600134
[5] 徐鹤, 吴满星, 李鹏.
基于ARIMA模型的RFID室内相对位置定位算法
RFID Indoor Relative Position Positioning Algorithm Based on ARIMA Model
计算机科学, 2020, 47(9): 252-257. https://doi.org/10.11896/jsjkx.200400038
[6] 李丽,郑嘉利,王哲,袁源,石静.
基于异步优势动作评价的RFID室内定位算法
RFID Indoor Positioning Algorithm Based on Asynchronous Advantage Actor-Critic
计算机科学, 2020, 47(2): 233-238. https://doi.org/10.11896/jsjkx.190100070
[7] 侯培国, 王志轩, 严晨.
基于RFID标签的防碰撞算法改进
Improvement of Anti-collision Algorithm Based on RFID Tag
计算机科学, 2019, 46(11A): 359-362.
[8] 杨子薇, 郑嘉利, 岳世彬, 袁源, 石静.
基于标签分组的新型Q值防碰撞算法
New Q Value Anti-collision Algorithm Based on Label Grouping
计算机科学, 2018, 45(9): 152-155. https://doi.org/10.11896/j.issn.1002-137X.2018.09.024
[9] 徐扬,苑津莎,高会生,赵振兵.
基于二次剩余理论的智能电表安全认证协议
Authentication Protocol for Smart Meter Based on Quadratic Residues
计算机科学, 2018, 45(7): 158-161. https://doi.org/10.11896/j.issn.1002-137X.2018.07.027
[10] 殷秋实, 陈建华.
多服务器环境下基于椭圆曲线密码的改进的身份认证协议
Improved Identity Authentication Protocol Based on Elliptic Curve Cryptographyin Multi-server Environment
计算机科学, 2018, 45(6): 111-116. https://doi.org/10.11896/j.issn.1002-137X.2018.06.019
[11] 刘耀宗, 刘云恒.
基于区块链的RFID大数据安全溯源模型
Security Provenance Model for RFID Big Data Based on Blockchain
计算机科学, 2018, 45(11A): 367-368.
[12] 章文斌,李二涛,李飞,李琰琰,朱艺华.
基于NAK的WISP数据传输方案
Negative Acknowledgement Based Data Delivery Scheme for WISP
计算机科学, 2017, 44(Z6): 294-299. https://doi.org/10.11896/j.issn.1002-137X.2017.6A.067
[13] 贾宁.
面向智能终端的校园教育互联系统的研究与实现
Research and Implementation of Campus Education Interconnection System for Intelligent Terminal
计算机科学, 2017, 44(Z11): 573-576. https://doi.org/10.11896/j.issn.1002-137X.2017.11A.122
[14] 关炀,闫国玉,王颖,蒋遂平.
RFID室内实时定位系统的数据滤波方法
Data Filtration Method for RFID Based Indoor RTLS
计算机科学, 2017, 44(Z11): 293-296. https://doi.org/10.11896/j.issn.1002-137X.2017.11A.062
[15] 宋岚,薛锦云,胡启敏,谢武平,江东明,游珍.
无线射频RFID识别协议自动验证方法研究
Research of Automatic Verification Method about Radio Frequency Identification Protocol
计算机科学, 2017, 44(9): 99-104. https://doi.org/10.11896/j.issn.1002-137X.2017.09.020
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!