计算机科学 ›› 2014, Vol. 41 ›› Issue (12): 125-128.doi: 10.11896/j.issn.1002-137X.2014.12.026
沈金伟,凌捷
SHEN Jin-wei and LING Jie
摘要: 针对RFID所有权转移协议中存在的拒绝服务攻击漏洞,提出了一种改进的超轻量级RFID所有权转移协议,并给出了基于GNY逻辑的协议安全性证明。通过改进协议的交互方式,实现了阅读器和标签的双向认证功能,解决了攻击者重放消息造成的拒绝服务攻击漏洞等问题,提高了阅读器和标签在开放环境中通信的保密性。对协议的安全性分析和性能比较分析表明,该协议不仅满足所有权转移的安全要求,而且具有超轻量的特点,适合于移动身份认证环境中的实际应用。
[1] 邵婧,陈越,常振华.RFID标签所有权转换模式及协议设计[J].计算机工程,2009,35(15):143-145 [2] Molnar D,Soppera A,Wagner D.A Scalable,Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags[C]∥Proc.of SAC’05.Kingston,Jamaica:Springer-Verlag,2005:276-290 [3] Osaka K,Takagi T,Yamazaki K,et al.An Efficient and Secure RFID Security Method with Ownership Transfer[C]∥Proc.of CIS’06.Springer-Verlag,2006:778-787 [4] Fouladgar S,Afifi H.An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags[C]∥Proc.of the 1st International Workshop on RFID Technology.Vienna,Austria,2007 [5] Kulseng L,Yu Zhen,Wei Ya-wen,et al.Lightweight mutual authentication and ownership transfer for RFID systems [C]∥Proc of the 29th Conf on Computer Communications IEEE INFOCOM 2010.Piscataway,NJ:IEEE,2010:1-5 [6] 金永明,孙惠平,关志,等.RFID标签所有权转移协议研究[J].计算机研究与发展,2011,48(8):1400-1405 [7] Fernandez-Mir A,Trujillo-Rasua R,Castella-Roca J,et al.AScalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation.RFID,Security and Privacy,LNCS,2012,7055:147-162 [8] Doss R,Zhou Wan-lei,Yu Shui.Secure RFID Tag Ownership Transfer Based on Quadratic Residues[J].IEEE Transcations on information forensics and security,2013,8(2):390-401 [9] 彭朋,赵一鸣,韩伟力,等.一种超轻量级的RFID双向认证协议[J].计算机工程,2011,37(16):140-142 [10] Shamir A.SQUASH-A new MAC with provable security properties for constrained devices such as RFID tags [C]∥LNCS 5086:Proc of 15th Annual Fast Software Encryption Workshop.Springer,2008:144-157 [11] 李杰.RFID安全认证协议研究与设计[D].西安:西安电子科技大学,2012:40-46 |
No related articles found! |
|