计算机科学 ›› 2014, Vol. 41 ›› Issue (12): 125-128.doi: 10.11896/j.issn.1002-137X.2014.12.026

• 信息安全 • 上一篇    下一篇

一种改进的超轻量级RFID所有权转移协议

沈金伟,凌捷   

  1. 广东工业大学计算机学院 广州510006;广东工业大学计算机学院 广州510006
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受广东省战略性新兴产业核心技术攻关项目(2012A010701004),广东省自然科学基金重点项目(S2012020011071),广东省教育部产学研合作项目(2012B091000037,2012B091000041)资助

Improved Ultra-lightweight Authentication of Ownership Transfer Protocol for RFID Tag

SHEN Jin-wei and LING Jie   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对RFID所有权转移协议中存在的拒绝服务攻击漏洞,提出了一种改进的超轻量级RFID所有权转移协议,并给出了基于GNY逻辑的协议安全性证明。通过改进协议的交互方式,实现了阅读器和标签的双向认证功能,解决了攻击者重放消息造成的拒绝服务攻击漏洞等问题,提高了阅读器和标签在开放环境中通信的保密性。对协议的安全性分析和性能比较分析表明,该协议不仅满足所有权转移的安全要求,而且具有超轻量的特点,适合于移动身份认证环境中的实际应用。

关键词: RFID,拒绝服务攻击,超轻量级,所有权转移议,GNY逻辑

Abstract: Aiming at the securing hole of current ownership transfer protocol,a ultra-lightweight RFID mutual aut- hentication of ownership transfer protocol was proposed.The formal proof of the proposed authentication protocol was given based on GNY logic.It improves the reader and the tag in an open environment confidentiality of communications,which not only solves problems of Denial of Service (DoS) that are produced when the attacker replays the message,but also achieves the reader and the tag mutual authentication function through changing protocols interact.This paper analyzed the security and compared the performance of the protocol.The results show that the proposed protocol not only satisfies the security requirements of transfer of ownership,but also has the characteristics of ultra-lightweight,which indicates that it is suitable for actual mobile authentication environment.

Key words: RFID,DoS attack,Ultra-lightweigh,Ownership transfer protocol,GNY logic

[1] 邵婧,陈越,常振华.RFID标签所有权转换模式及协议设计[J].计算机工程,2009,35(15):143-145
[2] Molnar D,Soppera A,Wagner D.A Scalable,Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags[C]∥Proc.of SAC’05.Kingston,Jamaica:Springer-Verlag,2005:276-290
[3] Osaka K,Takagi T,Yamazaki K,et al.An Efficient and Secure RFID Security Method with Ownership Transfer[C]∥Proc.of CIS’06.Springer-Verlag,2006:778-787
[4] Fouladgar S,Afifi H.An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags[C]∥Proc.of the 1st International Workshop on RFID Technology.Vienna,Austria,2007
[5] Kulseng L,Yu Zhen,Wei Ya-wen,et al.Lightweight mutual authentication and ownership transfer for RFID systems [C]∥Proc of the 29th Conf on Computer Communications IEEE INFOCOM 2010.Piscataway,NJ:IEEE,2010:1-5
[6] 金永明,孙惠平,关志,等.RFID标签所有权转移协议研究[J].计算机研究与发展,2011,48(8):1400-1405
[7] Fernandez-Mir A,Trujillo-Rasua R,Castella-Roca J,et al.AScalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation.RFID,Security and Privacy,LNCS,2012,7055:147-162
[8] Doss R,Zhou Wan-lei,Yu Shui.Secure RFID Tag Ownership Transfer Based on Quadratic Residues[J].IEEE Transcations on information forensics and security,2013,8(2):390-401
[9] 彭朋,赵一鸣,韩伟力,等.一种超轻量级的RFID双向认证协议[J].计算机工程,2011,37(16):140-142
[10] Shamir A.SQUASH-A new MAC with provable security properties for constrained devices such as RFID tags [C]∥LNCS 5086:Proc of 15th Annual Fast Software Encryption Workshop.Springer,2008:144-157
[11] 李杰.RFID安全认证协议研究与设计[D].西安:西安电子科技大学,2012:40-46

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!