计算机科学 ›› 2015, Vol. 42 ›› Issue (2): 95-99.doi: 10.11896/j.issn.1002-137X.2015.02.020

• 信息安全 • 上一篇    下一篇

基于数字签名的轻量级RFID认证协议

刘亚丽,秦小麟,赵向军,郝国生,董永权   

  1. 江苏师范大学计算机科学与技术学院 徐州221116,南京航空航天大学计算机科学与技术学院 南京210016,江苏师范大学计算机科学与技术学院 徐州221116,江苏师范大学计算机科学与技术学院 徐州221116,江苏师范大学计算机科学与技术学院 徐州221116
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家高技术研究发展计划(“863”计划)基金资助

Lightweight RFID Authentication Protocol Based on Digital Signature

LIU Ya-li, QIN Xiao-lin, ZHAO Xiang-jun, HAO Guo-sheng and DONG Yong-quan   

  • Online:2018-11-14 Published:2018-11-14

摘要: RFID系统的安全和隐私问题已成为阻碍其进一步扩展的瓶颈。针对低代价标签提出了一种基于签名方案的轻量级RFID认证协议,它利用数字签名技术和RFID认证技术的恰当结合,成功实现了RFID系统的轻量级认证机制。性能评估表明新协议除了具有主要的安全隐私性能属性之外,还能够抵抗多种典型的恶意攻击和威胁,其安全性依赖于在有限域上求解离散对数问题的困难性和伪随机数生成器的安全性。新协议将公钥密码技术中代价较高的运算置于服务器端,确保了标签端运算的轻量性,促进了公钥密码技术在RFID系统中的进一步实施。

关键词: RFID,轻量级,认证协议,数字签名

Abstract: The issues of security and privacy in RFID systems become the handicap to the development of RFID technology and the bottle neck of their further pervasive usage.A lightweight RFID authentication protocol based on digital signature was proposed,which combines digital signature technology and RFID authentication technology properly to implement the lightweight authentication mechanism of RFID systems successfully.Performance evaluation shows that this protocol not only has main security and privacy properties,but also can resist a variety of typical malicious attacks and threats.The security of this protocol is based on the assumption of difficulty in solving the discrete logarithm hard problem in the finite field and the security of pseudo random number generator.The protocol puts the higher cost operations of public key cryptography over the server end,which ensures the lightweight operation of the tag end and promotes the further application of public key cryptography in RFID systems.

Key words: RFID,Lightweight,Authentication protocol,Digital signature

[1] Schneider M.Radio frequency identification (RFID) technology and its applications in the commercial construction industry[D].University of Kentucky,2003
[2] Chawla V,Dong-Sam H.An overview of passive RFID[J].Communications Magazine,IEEE,2007,45(9):11-17
[3] Roussos G,Kostakos V.rfid in pervasive computing:State-of-the-art and outlook[J].Pervasive and Mobile Computing,2009,5(1):110-131
[4] Want R.The Magic of RFID[J].Queue,2004,2(7):40-48
[5] Juels A.RFID security and privacy:a research survey[J].IEEE Journal on Selected Areas in Communications,2006,24(2):381-394
[6] Hlavácˇ .Known-Plaintext-Only Attack on RSA-CRT withMontgomery Multiplication[C]∥Cryptographic Hardware and Embedded Systems(CHES 2009).Springer,2009:128-140
[7] Nithyanand R.The evolution of cryptographic protocols in electronic passports:Cryptology ePrint archive[R].Report 2009/200
[8] Yanjun Z.Survivable RFID Systems:Issues,Challenges,andTechniques[J].IEEE Transactions on Systems,Man,and Cybernetics,Part C:Applications and Reviews,2010,40(4):406-418
[9] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.LAMED-A PRNG for EPC Class-1 Generation-2 RFID specification[J].Comput.Stand.Interfaces.,2009,31(1):88-97
[10] Batina L,Guajardo J,Kerins T,et al.Public-Key Cryptography for RFID-Tags[C]∥Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops,2007(PerCom Workshops’07).2007:217-222
[11] McLoone M,Robshaw M J B.New Architectures for Low-Cost Public Key Cryptography on RFID Tags[C]∥ IEEE International Symposium on Circuits and Systems,2007(ISCAS 2007).2007:1827-1830
[12] Hoffstein J,Howgrave-Graham N,Pipher J,et al.NTRUSign:Digital Signatures Using the NTRU Lattice[C]∥Joye M,ed.Topics in Cryptology(CT-RSA 2003).Springer Berlin Heidelberg,2003:122-140
[13] Hutter M,Feldhofer M,Plos T.An ECDSA Processor for RFID Authentication[C]∥Yalcin S O,ed.Radio Frequency Identification:Security and Privacy Issues.Springer Berlin Heidelberg,2010:189-202
[14] Calmels B,Canard S,Girault M,et al.Low-Cost Cryptography for Privacy in RFID Systems[C]∥Domingo-Ferrer J,Posegga J,Schreckling D,eds.Smart Card Research and Advanced Applications.Springer Berlin Heidelberg,2006:237-251
[15] Liang Y,Rong C.RFID System Security Using Identity-Based Cryptography[C]∥Presented at the Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing.Oslo,Norway,2008:482-489
[16] Liu Ya-li,Qin Xiao-lin,Li Bo-han.Forward-Secure Blind Signature Schemes Based on the Variants of ElGamal[J].China Communications,2010,7(4):58-64
[17] C Hung-yu.SASI:A New Ultralightweight RFID Authentica-tion Protocol Providing Strong Authentication and Strong Integrity[J].IEEE Transactions on Dependable and Secure Computing,2007,4 (4):337-340

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!