计算机科学 ›› 2017, Vol. 44 ›› Issue (1): 183-187.doi: 10.11896/j.issn.1002-137X.2017.01.035

• 信息安全 • 上一篇    下一篇

一种新的超轻量级RFID认证协议

张亚力,郭亚军,崔建群,曾庆江   

  1. 华中师范大学计算机学院 武汉430079,华中师范大学计算机学院 武汉430079,华中师范大学计算机学院 武汉430079,华中师范大学计算机学院 武汉430079
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受国家自然科学基金(61370108),中央高校基本科研业务费项目(CCNU2015GF0004)资助

New Ultra-lightweight RFID Authentication Protocol

ZHANG Ya-li, GUO Ya-jun, CUI Jian-qun and ZENG Qing-jang   

  • Online:2018-11-13 Published:2018-11-13

摘要: RFID(无线射频识别)技术以无线通信的方式广泛运用于生活生产的各个领域,如门禁设备、支付设备等,但阅读器和标签之间无线开放的通信环境使得RFID设备面临更多的恶意攻击和安全威胁。低成本标签只具有非常有限的计算能力和存储空间,一般的分组密码和hash函数等都不能用于低成本标签中。为了解决低成本标签的安全性问题,采用比特位运算密码原语,提出一种新的超轻量级RFID认证协议——SIUAP。SIUAP协议在SIMON 类算法的超轻量级轮函数F(x)和非线性函数MIXBITS运算的基础上,使用3种简单的比特位运算:比特AND运算、异或运算和循环移位运算,大大降低了计算复杂度。通过GNY逻辑对协议进行形式化的分析,证明了SIUAP协议能够实现阅读器和标签双向合法身份的认证,同时对SIUAP进行安全性分析。与现有的超轻量级认证协议相比,SIUAP协议具有较小的计算开销,能够满足RFID系统低成本、高安全性的需求。

关键词: 无线射频识别,超轻量级,双向认证

Abstract: RFID (Radio Frequency Identification) technology is widely applied in many fields of life and production,such as access control equipment,payment equipment and others in wireless communication way.However,the wireless communication environment between the reader and the tag makes the RFID device face more malicious attacks and security threats.Because the low-cost tag only has very limited computing power and storage space,the common block cipher and hash function cannot be used for low cost tag.To solve the security problem of the low cost tag,this paper proposed a new ultra-lightweight RFID authentication protocol—SIUAP by using the bit operation code.Based on the lightweight wheel function F(x) and nonlinear function MIXBITS operations,which belong to SIMON algorithm,SIUAP protocol adopts three simple bit operations:Bits AND operation,XOR and cyclic shift operations,which greatly reduces the computational complexity.Through formally analyzing the protocol by GNY logic,it has been proved that the SIUAP protocol can realize the authentication of the reader and tag.Meanwhile,a security analysis of the SIUAP was also given.Compared with the existing ultra-lightweight authentication protocol,the SIUAP protocol has lower computational cost,which can meet the requirements of the RFID system of low cost and high security.

Key words: Radio frequency identification,Ultra-lightweight,Mutual authentication

[1] ZHANG Y,BAI L.Rapid structural condition assessment using radio frequency identification (RFID) based wireless strain sensor[J].Automation in Construction,2015,54(6):1-11.
[2] WARTHA L N R,LONDHE V.Context-Aware Approach for enhancing security and privacy of RFID[J].International Journal of Engineering And Computer Science,2015,4(1):1078-1088.
[3] GARICA J,BARBEAU M,KRANAKIS E.Handling security threats to the RFID system of EPC networks[J].Security of Self-Organizing Networks,2010,12(3):45-64.
[4] DAS M L.Strong Security and Privacy of RFID System for Internet of Things Infrastructure[M]∥Security,Privacy,and Applied Cryptography Engineering.Springer Berlin Heidelberg,2013:56-69.
[5] JIN Yong-ming,WU Qi-ying,SHI Zhi-qiang,et al.Research and development of RFID lightweight authentication protocol based on [J].PRF Computer Research and Development,2014,1(7):1506-1514(in Chinese) 金永明,吴棋滢,石志强,等.基于PRF的RFID轻量级认证协议研究[J].计算机研究与发展,2014,1(7):1506-1514.
[6] CHIEN H.SASI:A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity[J].IEEE Transactions on Dependable and Secure Computing,2007,4(4):337-340.
[7] PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,ESTéVEZ-TAP-IADOR J M,et al.LMAP:A real lightweight mutual authentication protocol for low-cost RFID tags[C]∥Proceedings of the Workshop on RFID Security.2006:12-14.
[8] PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,ESTéVEZ-TAP-IADOR J M,et al.EMAP:An efficient mutual-authentication protocol for low-cost RFID tags[C]∥Proceedings of the OTM 2006 Workshops on the Move to Meaningful Internet Systems.Springer Berlin Heidelberg,2006:352-361.
[9] PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,ESTéVEZ-TAPIADOR J M,et al.M2AP:A minimalist mutual-authentication protocol for low-cost RFID tags[M]∥Ubiquitous Intelligence and Computing.Springer Berlin Heidelberg,2006:912-923.
[10] PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,TAPIADOR J M E,et al.Advances in Ultralightweight cryptography for low-cost RFID tags:Gossamer protocol [M]∥Information Security Applications.Springer Berlin Heidelberg,2009:56-68.
[11] SUN H M,TING W C,WANG K H.On the security of Chien’s ultralightweight RFID authentication protocol[J].IEEE Tran-sactions on Dependable and Secure Computing,2011,2(8):315-317.
[12] ARCO P D,SANTIS A D.On ultralightweight RFID authentication protocols[J].IEEE Transactions on Dep Ependable and Secure Computing,2011,8(4):548-563.
[13] PENG P,ZHAO Y M,HAN W L,et al.Ultra-lightweight RFID Mutual Authentication Protocol[J].Computer Engineering,2011,37(16):140-142.
[14] TIAN Y,CHEN G,LI J.A New Ultralightweight RFID Authentication Protocol with Permutation[J].IEEE Communications Letters,2012,16(5):702-705.
[15] WANG shao-hui,HAN zhi-jie,LIU Su-juan,et al.Security Analysis of RAPP an FRID Authentication Protocol based on Permutation[R].Cryptology ePrint Archive,Report 2012/327,2.
[16] AHMADIAN Z,SALMASIZADEH M,AREF M R.Desynchronization attack on RAPP ultralightweight authentication protocol[J].Information Processing Letters,2013,113(7):205-209.
[17] ABED F,LIST E,LUCKS S,et al.Differential and linear cryptanalysis of reduced-round SIMON[R].Cryptology EPrint Archive,Report 2013/526,2013.
[18] ZHANG D,LI G,PAN Z,et al.A new anti-collision algorithm for RFID tag[J].International Journal of Communication Systems,2014,27(11):3312-3322.
[19] BURROWS M,ABADI M,NEEDHAM R M.A logic of authentication[C]∥Proceedings of the Royal Society of London A:Mathematical,Physical and Engineering Sciences.The Royal Society,1989:233-271.
[20] SAUL E,HUTCHISON A C M.A graphical environment forthe facilitation of logic-based security protocol analysis[J].South African Computer Journal,2000(26):196-200.
[21] GONG L,NEEDHAM R,YAHALOM R.Reasoning about belief in cryptographic protocols[C]∥Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy.California:IEEE Computer Society Press,1990:234-248.
[22] MA Chang-she.Low Cost RFID Authentication Protocol with Forward Privacy[J].Chinese Journal of Computers,2011,4(8):1387-1398.(in Chinese) 马昌社.前向隐私安全的低成本RFID认证协议[J].计算机学报,2011,34(8):1387-1398

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!