Computer Science ›› 2017, Vol. 44 ›› Issue (1): 172-175.doi: 10.11896/j.issn.1002-137X.2017.01.033

Previous Articles     Next Articles

Improved RFID Key Wireless Generation Algorithm Based on Tag Part ID

HUANG Qi, LING Jie and HE Xiao-tao   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Aiming at the security problem that the initial key is easy to leak in the wireless radio frequency identification system,a RFID key wireless generation algorithm based on tag part ID was proposed.Before the tag and reader authentication,the sharing key is generated by the part of label ID and the random number reader generated XOR.Security analysis shows that the proposed algorithm can effectively resist replay attacks,man-in-the-middle attacks,desynchronization attacks and other active attacks,as well as passive attacks,with high security and low cost advantages.

Key words: RFID,ID,Key generation,Privacy protection

[1] MAMUN M S I,MIYAJI A,RAHMAN M S.A secure and private RFID authentication protocol under SLPN problem[C]∥Proc of the 6th Int Conf on Network and System Security.Berlin:Springer,2012:476-489.
[2] ALOMAIR B,CUELLAR J,POOVENDRAN R.Scalable RFID systems:A privacy-preserving protocol with constant time identification[J].IEEE Transactions on Parallel and Distributed Systems,2012,3(8):1536-1550.
[3] ZHOU S J,ZHANG W Q,LUO J Q.Overview of radio frequency identification (RFID) privacy protection technology [J].Journal of Software,2015,6(4):960-976.(in Chinese) 周世杰,张文清,罗嘉庆.射频识别(RFID)隐私保护技术综述[J].软件学报,2015,6(4):960-976.
[4] CALMELS B,CANARD S,GIRAULT M,et al.Low-Cost Cry-ptography for Privacy in RFID Systems[M]∥Domingo-Ferrer J,Posegga J,SchrecklingD,eds.Smart Card Research and Advanced Applications.BerlinHeidelberg:Springer,2006:37-251.
[5] DING Z H,LI J T,FENG B.Research on hash-based RFID security authentication protocol [J].Journal of computer Research and Development,2009,6(4):583-592.(in Chinese) 丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,6(4):583-592.
[6] MA C S.Low cost RFID authentication protocol with forward privacy[J].Chinese Journal of Computers,2011,4(8):1387-1397.(in Chinese) 马昌社.前向隐私安全的低成本RFID认证协议[J].计算机学报,2011,4(8):1387-1397.
[7] SADIKIN M F,KYAS M.Security and privacy protocol for e-merging smart RFID applications[C]∥Proceeding of the 15th IEEE/ACIS Int’l Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing.Atlanta:IEEE Computer Society,2014:1-7.
[8] YEH K H,LO N W,WINATA E.An efficient ultralightewight authentication protocol for RFID systems[C]∥Proc of RFID Sec Asia 2010.Piscataway,NJ:IEEE,2010:49-60.
[9] WANG S H,LIU S J,CHEN D W.Scalable RFID Mutual Authentication Protocol with Backward Privacy[J].Journal of Computer Research and Development,2013,0(6):1276-1284.(in Chinese) 王少辉,刘素娟,陈丹伟.满足后向隐私的可扩展RFID双向认证方案[J].计算机研究与发展,2013,50(6):1276-1284.
[10] BURMESTER M,MUNILLA J.Lightweight RFID authentication with forward and backward security [J].ACM Transactions on Information and System Security (TISSEC),2011,4(1):1-11.
[11] JIN Y M,WU Q Y,SHI Z Q,et al.RFID Lightweight Authentication Protocol Based on PRF[J].Journal of Computer Research and Development,2014,51(7):1506-1514.(in Chinese) 金永明,吴棋滢,石志强,等.基于PRF的RFID轻量级认证协议研究[J].计算机研究与发展,2014,1(7):1506-1514.
[12] SHEN J W,LING J.An improved ultra lightweight RFID authentication protocol[J].Computer Applications and Software,2015,2(2):304-306.(in Chinese) 沈金伟,凌捷.一种改进的超轻量级RFID认证协议[J].计算机应用与软件,2015,2(2):304-306.
[13] LU L.Wireless Key Generation for RFID System[J].Chinese Journal of Computers,2015,38(4):822-832.(in Chinese) 鲁力.RFID系统密钥无线生成[J].计算机学报,2015,8(4):822-832.
[14] CANTALICE R,MARCELO L,et al.Low power,high-sensit-ivity clock recovery circuit for LF/HF RFID applications[C]∥Proceedings of the 28th Symposium on Integrated Circuits and Systems Design.NewYork:ACM,2015.
[15] KUO C,LUK M,NEGI R,et al.Message-in-a-botle:Userfriendly and secure key deployment for sensor nodes[C]∥Proceedings of the 5th International Conference on Embedded Networked Sensor Systems.Sydney,Australia,2007:233-246.
[16] SHAMIR A.SQUASH-A new MAC with provable security pro-perties for highly constrained devices such as RFID tags [C]∥Proc of Fast Software Encryption.Berlin:Springer,2008:144-157.
[17] SHAMIR A.SQUASH-A new MAC with provable security pro-perties for highly constrained devices such as RFID tags[C]∥Proc of Fast Software Encryption.Berlin:Springer,2008:144-157.
[18] ZUO Y.Survivable RFID Systems:Issues,Challenges,and Tech-niques [J].IEEE Transactionson Systems,Man,and Cyberne-tics,Part C:Applications and Reviews,2010,0(4):406-418.
[19] FINKENZELLER K.RFID Handbook:Fundamentals and Applications in Comtactless,Smart Cards and Identification(2nd Edition)[M].John Wiley & Sons Ltd,2003.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .