Computer Science ›› 2017, Vol. 44 ›› Issue (1): 172-175.doi: 10.11896/j.issn.1002-137X.2017.01.033

Previous Articles     Next Articles

Improved RFID Key Wireless Generation Algorithm Based on Tag Part ID

HUANG Qi, LING Jie and HE Xiao-tao   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Aiming at the security problem that the initial key is easy to leak in the wireless radio frequency identification system,a RFID key wireless generation algorithm based on tag part ID was proposed.Before the tag and reader authentication,the sharing key is generated by the part of label ID and the random number reader generated XOR.Security analysis shows that the proposed algorithm can effectively resist replay attacks,man-in-the-middle attacks,desynchronization attacks and other active attacks,as well as passive attacks,with high security and low cost advantages.

Key words: RFID,ID,Key generation,Privacy protection

[1] MAMUN M S I,MIYAJI A,RAHMAN M S.A secure and private RFID authentication protocol under SLPN problem[C]∥Proc of the 6th Int Conf on Network and System Security.Berlin:Springer,2012:476-489.
[2] ALOMAIR B,CUELLAR J,POOVENDRAN R.Scalable RFID systems:A privacy-preserving protocol with constant time identification[J].IEEE Transactions on Parallel and Distributed Systems,2012,3(8):1536-1550.
[3] ZHOU S J,ZHANG W Q,LUO J Q.Overview of radio frequency identification (RFID) privacy protection technology [J].Journal of Software,2015,6(4):960-976.(in Chinese) 周世杰,张文清,罗嘉庆.射频识别(RFID)隐私保护技术综述[J].软件学报,2015,6(4):960-976.
[4] CALMELS B,CANARD S,GIRAULT M,et al.Low-Cost Cry-ptography for Privacy in RFID Systems[M]∥Domingo-Ferrer J,Posegga J,SchrecklingD,eds.Smart Card Research and Advanced Applications.BerlinHeidelberg:Springer,2006:37-251.
[5] DING Z H,LI J T,FENG B.Research on hash-based RFID security authentication protocol [J].Journal of computer Research and Development,2009,6(4):583-592.(in Chinese) 丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,6(4):583-592.
[6] MA C S.Low cost RFID authentication protocol with forward privacy[J].Chinese Journal of Computers,2011,4(8):1387-1397.(in Chinese) 马昌社.前向隐私安全的低成本RFID认证协议[J].计算机学报,2011,4(8):1387-1397.
[7] SADIKIN M F,KYAS M.Security and privacy protocol for e-merging smart RFID applications[C]∥Proceeding of the 15th IEEE/ACIS Int’l Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing.Atlanta:IEEE Computer Society,2014:1-7.
[8] YEH K H,LO N W,WINATA E.An efficient ultralightewight authentication protocol for RFID systems[C]∥Proc of RFID Sec Asia 2010.Piscataway,NJ:IEEE,2010:49-60.
[9] WANG S H,LIU S J,CHEN D W.Scalable RFID Mutual Authentication Protocol with Backward Privacy[J].Journal of Computer Research and Development,2013,0(6):1276-1284.(in Chinese) 王少辉,刘素娟,陈丹伟.满足后向隐私的可扩展RFID双向认证方案[J].计算机研究与发展,2013,50(6):1276-1284.
[10] BURMESTER M,MUNILLA J.Lightweight RFID authentication with forward and backward security [J].ACM Transactions on Information and System Security (TISSEC),2011,4(1):1-11.
[11] JIN Y M,WU Q Y,SHI Z Q,et al.RFID Lightweight Authentication Protocol Based on PRF[J].Journal of Computer Research and Development,2014,51(7):1506-1514.(in Chinese) 金永明,吴棋滢,石志强,等.基于PRF的RFID轻量级认证协议研究[J].计算机研究与发展,2014,1(7):1506-1514.
[12] SHEN J W,LING J.An improved ultra lightweight RFID authentication protocol[J].Computer Applications and Software,2015,2(2):304-306.(in Chinese) 沈金伟,凌捷.一种改进的超轻量级RFID认证协议[J].计算机应用与软件,2015,2(2):304-306.
[13] LU L.Wireless Key Generation for RFID System[J].Chinese Journal of Computers,2015,38(4):822-832.(in Chinese) 鲁力.RFID系统密钥无线生成[J].计算机学报,2015,8(4):822-832.
[14] CANTALICE R,MARCELO L,et al.Low power,high-sensit-ivity clock recovery circuit for LF/HF RFID applications[C]∥Proceedings of the 28th Symposium on Integrated Circuits and Systems Design.NewYork:ACM,2015.
[15] KUO C,LUK M,NEGI R,et al.Message-in-a-botle:Userfriendly and secure key deployment for sensor nodes[C]∥Proceedings of the 5th International Conference on Embedded Networked Sensor Systems.Sydney,Australia,2007:233-246.
[16] SHAMIR A.SQUASH-A new MAC with provable security pro-perties for highly constrained devices such as RFID tags [C]∥Proc of Fast Software Encryption.Berlin:Springer,2008:144-157.
[17] SHAMIR A.SQUASH-A new MAC with provable security pro-perties for highly constrained devices such as RFID tags[C]∥Proc of Fast Software Encryption.Berlin:Springer,2008:144-157.
[18] ZUO Y.Survivable RFID Systems:Issues,Challenges,and Tech-niques [J].IEEE Transactionson Systems,Man,and Cyberne-tics,Part C:Applications and Reviews,2010,0(4):406-418.
[19] FINKENZELLER K.RFID Handbook:Fundamentals and Applications in Comtactless,Smart Cards and Identification(2nd Edition)[M].John Wiley & Sons Ltd,2003.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!