计算机科学 ›› 2013, Vol. 40 ›› Issue (12): 141-146.

• 网络与通信 • 上一篇    下一篇

一种超轻量级RFID双向认证协议

刘亚丽,秦小麟,王超   

  1. 南京航空航天大学计算机科学与技术学院 南京210016;南京航空航天大学计算机科学与技术学院 南京210016;南京航空航天大学计算机科学与技术学院 南京210016
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金项目(61373015),2010年度国家教育部高等学校博士学科点专项科研基金项目(20103218110017), 江苏高校优势学科建设工程资助

Ultralightweight RFID Mutual-authentication Protocol

LIU Ya-li,QIN Xiao-lin and WANG Chao   

  • Online:2018-11-16 Published:2018-11-16

摘要: 开放的无线通信环境,尤其是阅读器和标签间的无线信道,使得无线射频识别(RFID)系统的安全和隐私问题逐渐成为值得关注的焦点,因此设计抗各种恶意攻击和安全威胁的超轻量级RFID 认证协议是非常必要的。针对低代价标签提出了一种新的超轻量级RFID双向认证协议,该协议避免了已有RFID认证协议存在的安全隐患。安全分析表明新协议具有较强的安全和隐私属性,并且能够抵抗各种可能的恶意攻击。根据低代价RFID标签资源受限的需求,新协议仅需要在标签上执行两种简单的比特位操作,与其他超轻量级RFID认证协议相比具有更好的性能优势。

关键词: RFID,超轻量级,双向认证,低代价

Abstract: Due to the open wireless communication environments in radio frequency identification (RFID) systems,particularly the reader-tag air interface,security and privacy are increasingly becoming noteworthy issues.It is imperative to design ultralightweight RFID authentication protocols to resist various malicious attacks and threats.A new ultralightweight RFID mutual-authentication protocol for low-cost was proposed,which avoids the security omission in the previous RFID authentication protocols.Security analysis shows that the protocol possesses robust security and privacy properties as well as defending against the possible malicious attacks.In terms of the resource-constrained requirements of low-cost RFID tags,the protocol requires only two simple bitwise operations over the tag end and meanwhile it has better performance advantages compared with other ultralightweight RFID authentication protocols.

Key words: RFID,Ultralightweight,Mutual authentication,Low-cost

[1] Juels A.RFID Security and Privacy:A Research Survey [J].IEEE Journal on Selected Areas in Communications,2006,24(2):381-394
[2] Juels A.Strengthening EPC Tag against Cloning [C]∥Procee-dings of the 4th ACM Workshop on Wireless Security.ACM,2005:67-76
[3] Liu Ya-li,Qin Xiao-lin,Li Bo-han,et al.A Forward-SecureGrouping-proof Protocol for Multiple RFID tags [J].International Journal of Computational Intelligence Systems,2012,5(5):824-833
[4] Chien H Y,Chen C H.Mutual Authentication Protocol forRFID Conforming to EPC Class-1Generation-2Standards [J].Computer Standards and Interfaces,2007,29(2):254-259
[5] Rotter P.A Framework for Assessing RFID System Securityand Privacy Risks [J].IEEE Pervasive Computing,2008,7(2):70-77
[6] Zuo Y.Survivable RFID Systems:Issues,Challenges,and Techniques [J].IEEE Transactions on Systems,Man,and Cyberne-tics-Part C:Applications and Reviews,2010,40(4):406-418
[7] Chien H Y.SASI:A New Ultralightweight RFID Authentica-tion Protocol Providing Strong Authentication and Strong Integrity [J].IEEE Transactions on Dependable and Secure Computing,2007,4(4):337-340
[8] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.LMAP:A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags [C]∥Proc.Second Workshop RFID Security.Graz,Austria,2006:12-14
[9] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.EMAP:An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags [C]∥Proc.OTM Federated Conf.and Workshop:IS Workshop (IS’06).LNCS 4277,Springer-Verlag,Berlin Heidelberg,2006:352-361
[10] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.M2AP:A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags [C]∥Proc.Int’l Conf.Ubiquitous Intelligence and Computing (UIC’06).LNCS 4159,2006:912-923
[11] Lo N W,Shie H S,Yeh K H.A Design of RFID Mutual Authentication Protocol Using Lightweight Bitwise Operations [C]∥Proc.the 3rd Joint Workshop on Information Security (JWIS 2008).Seoul,Korea,2008
[12] Li Tie-yan.Employing Lightweight Primitives on Low-costRFID Tags for Authentication [C]∥Proc.Vehicular Technology Conference 2008(VTC’08).IEEE,68th,2008:1-5
[13] Burmester M,Munilla O.Lightweight RFID Authenticationwith Forward and Backward Security [J].ACM Transactions on Information and System Security (TISSEC),2011,14(1):11-37
[14] Li Tie-yan,Deng R.Vulnerability Analysis of EMAP-An Effi-cient RFID Mutual Authentication Protocol [C]∥ The Second International Conference on Availability,Reliability and Security (ARES’07).IEEE,2007:238-245
[15] Li Tie-yan,Wang Gui-lin.Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols [C]∥New Approaches for Security,Privacy and Trust in Complex Environments.Springer US,2007,232:109-120
[16] Chien H Y,Huang C W.Security of Ultra-Lightweight RFIDAuthentication Protocols and Its Improvements [J].ACM Operating System Rev.,2007,41(2):83-86
[17] Safkhani M,Bagheri N,Naderi M,et al.Security Analysis ofLMAP++,an RFID Authentication Protocol [C]∥Proc.2011International Conference for Internet Technology and Secured Transactions (ICITST’11).IEEE,2011:689-694
[18] Sun H M,Ting W C,Wang K H.On the Security of Chien’s Ultralightweight RFID Authentication Protocol [J].IEEE Tran-sactions on Dependable and Secure Computing,2011,8(2):315-317
[19] Vajda I,Butty’an L.Lightweight Authentication Protocols for Low-cost RFID Tags [C]∥Proc.Second Workshop on Security in Ubiquitous Computing-Ubicomp (UBICOMP’03).2003
[20] Juels A.Minimalist Cryptography for Low-cost RFID Tags [C]∥SCN’04Proceedings of the 4th International Conference on Security in Communication Networks.Springer Berlin Heidelberg,2005:149-164
[21] Arco P D,De Santis A.On Ultralightweight RFID Authentication Protocols [J].IEEE Transactions on Dependable and Secure Computing,2011,8(4):548-563
[22] Tian Yun,Chen Gong-liang,Li Jian-hua.A New Ultralight-weight RFID Authentication Protocol with Permutation [J].IEEE Communications Letters,2012,16(5):702-705
[23] Wang Shao-hui,Han Zhi-jie,Liu Su-juan,et al.Security Analysis of RAPP An RFID Authentication Protocol based on Permutation [R].Cryptology ePrint Archive,Report 2012/327,2012
[24] Ahmadian Z,Salmasizadeh M,Aref M R.Desynchronization Attack on RAPP Ultralightweight Authentication Protocol [J].Information Processing Letters,2013,113(7):205-209
[25] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.LAMED-A PRNG for EPC Class-1Generation-2RFID Specification [J].Computer Standards and Interfaces,2009,31:88-97

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!