计算机科学 ›› 2013, Vol. 40 ›› Issue (11): 103-107.

• 信息安全 • 上一篇    下一篇

基于不可追踪模型的轻量级RFID认证协议

陈秀清,曹天杰,郭玉   

  1. 中国矿业大学计算机科学与技术学院 徐州221116;中国矿业大学计算机科学与技术学院 徐州221116;中国矿业大学计算机科学与技术学院 徐州221116
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金(61202478,61303263),中央高校基本科研业务费(2013QNA26)资助

Lightweight Authentication Protocol for RFID Based on Model of Untraceability

CHEN Xiu-qing,CAO Tian-jie and GUO Yu   

  • Online:2018-11-16 Published:2018-11-16

摘要: 在Ha等提出的基于Hash函数的低成本RFID认证协议中, 敌手捕获 标签和读卡器之间传送的信息后,就可以实现跟踪攻击。在分析Ha等提出的低成本RFID认证协议的基础上,设计出了 效率更高的追踪攻击算法。Ha等提出的低成本RFID认证协议易于遭受追踪攻击,敌手可以从低位到高位,逐个比特位地猜测出合法的标签密钥的比特位,针对这一缺点提出了可以抵抗追踪攻击的改进协议,并用不可追踪模型形式化证明了该协议不可追踪的鲁棒性。

关键词: RFID认证协议,跟踪攻击,不可追踪模型

Abstract: We analyzed the security of RFID authentication protocols recently proposed by Ha et al.Our security analysis clearly highlights important security weakness in this article.More precisely,an adversary analyzes the messages between reader and tag and implements traceability attacks.Then,the adversary performs the passive full-disclosure attacks and discloses the tags’ secret.In order to evaluate the performance of traceability attacks,we observed the toy experimental results by running several tests on an implementation of the protocol.Finally,we used the formal model of untraceability,which successfully proves the robustness against tracing attacks and the untraceability of the enhanced scheme.

Key words: RFID authentication protocols,Traceability attack,Formal model of untraceability

[1] 史艳伟,张岩庆,刘克胜.基于RFID系统的安全性问题研究[J].计算机科学,2012,9(6A):214-216
[2] Avoine G,Carpent X,Martin B.Privacy-friendly synchronized ultralightweight authentication protocols in the storm [J].Journal of Network and Computer Applications,2012,35(2):826-843
[3] Ha J,Moon S,Nieto J M G,et al.Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP) [M].Emerging Technologies in Knowledge Discovery and Data Mining.Springer,2007:574-583
[4] Thompson D R,Chaudhry N,Thompson C W.RFID securitythreat model[C]∥Proceedings of the Conf on Applied Research in Information Technology.2006
[5] 梁昌勇,陆鑫,俞家文,等.基于云计算的供应链RFID信息服务研究[J].计算机应用研究 ,2011,8(9):3375-3380
[6] 邓淼磊,朱昭,石金娥,等.RFID标签的不可追踪性[J].北京邮电大学学报,2010,3(2):44-47
[7] 李慧贤.轻量级RFID双向认证协议设计与分析[J].西安电子科技大学学报:自然科学版,2012,9(1):172-178
[8] Ton V D,Sjouke M,Saˇsa R.Untraceability of RFID protocols [M].Information Security Theory and Practices Smart Devices,Convergence and Next Generation Networks.Springer,2008:1-15
[9] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.M2AP:a minimalist mutual-authentication protocol for low-cost RFID tags[C]∥Ma J,Jin H,Tianruo Yang L,Tsai JJP,eds.International conference on ubiquitous intelligence and computing—UIC’06.Lecture notes in computer science,vol.4259.Wuhan and Three Gorges,China:Springer,2006:912-23
[10] Phan R-W.Cryptanalysis of a new ultralightweight RFID au-thentication protocol—SASI [J]. IEEE Transactions on Dependable and Secure Computing,2009,6(4):316-320
[11] Hernandez-Castro J C,Peris-Lopez P,Phan R C-W,et al.Cryptanalysis of the David-Prasad RFID ultralightweight authentication protocol [M].Radio Frequency Identification:Security and Privacy Issues.Springer,2010:22-34
[12] Peris-Lopez P,Hernandez-Castro J C,Phan R C-W,et al.Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol [C]∥Proceedings of the Information Security and Cryptology.2011
[13] Yeh K-H,Lo N,Winata E.An efficient ultralightweight authentication protocol for RFID systems [J].Proc of RFIDSec Asia,2010,0:49-60

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!