计算机科学 ›› 2013, Vol. 40 ›› Issue (11): 103-107.
陈秀清,曹天杰,郭玉
CHEN Xiu-qing,CAO Tian-jie and GUO Yu
摘要: 在Ha等提出的基于Hash函数的低成本RFID认证协议中, 敌手捕获 标签和读卡器之间传送的信息后,就可以实现跟踪攻击。在分析Ha等提出的低成本RFID认证协议的基础上,设计出了 效率更高的追踪攻击算法。Ha等提出的低成本RFID认证协议易于遭受追踪攻击,敌手可以从低位到高位,逐个比特位地猜测出合法的标签密钥的比特位,针对这一缺点提出了可以抵抗追踪攻击的改进协议,并用不可追踪模型形式化证明了该协议不可追踪的鲁棒性。
[1] 史艳伟,张岩庆,刘克胜.基于RFID系统的安全性问题研究[J].计算机科学,2012,9(6A):214-216 [2] Avoine G,Carpent X,Martin B.Privacy-friendly synchronized ultralightweight authentication protocols in the storm [J].Journal of Network and Computer Applications,2012,35(2):826-843 [3] Ha J,Moon S,Nieto J M G,et al.Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP) [M].Emerging Technologies in Knowledge Discovery and Data Mining.Springer,2007:574-583 [4] Thompson D R,Chaudhry N,Thompson C W.RFID securitythreat model[C]∥Proceedings of the Conf on Applied Research in Information Technology.2006 [5] 梁昌勇,陆鑫,俞家文,等.基于云计算的供应链RFID信息服务研究[J].计算机应用研究 ,2011,8(9):3375-3380 [6] 邓淼磊,朱昭,石金娥,等.RFID标签的不可追踪性[J].北京邮电大学学报,2010,3(2):44-47 [7] 李慧贤.轻量级RFID双向认证协议设计与分析[J].西安电子科技大学学报:自然科学版,2012,9(1):172-178 [8] Ton V D,Sjouke M,Saˇsa R.Untraceability of RFID protocols [M].Information Security Theory and Practices Smart Devices,Convergence and Next Generation Networks.Springer,2008:1-15 [9] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.M2AP:a minimalist mutual-authentication protocol for low-cost RFID tags[C]∥Ma J,Jin H,Tianruo Yang L,Tsai JJP,eds.International conference on ubiquitous intelligence and computing—UIC’06.Lecture notes in computer science,vol.4259.Wuhan and Three Gorges,China:Springer,2006:912-23 [10] Phan R-W.Cryptanalysis of a new ultralightweight RFID au-thentication protocol—SASI [J]. IEEE Transactions on Dependable and Secure Computing,2009,6(4):316-320 [11] Hernandez-Castro J C,Peris-Lopez P,Phan R C-W,et al.Cryptanalysis of the David-Prasad RFID ultralightweight authentication protocol [M].Radio Frequency Identification:Security and Privacy Issues.Springer,2010:22-34 [12] Peris-Lopez P,Hernandez-Castro J C,Phan R C-W,et al.Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol [C]∥Proceedings of the Information Security and Cryptology.2011 [13] Yeh K-H,Lo N,Winata E.An efficient ultralightweight authentication protocol for RFID systems [J].Proc of RFIDSec Asia,2010,0:49-60 |
No related articles found! |
|