基于共享秘密的偽隨機(jī)散列函數(shù)RFID雙向認(rèn)證協(xié)議
doi: 10.11999/JEIT150653
-
2.
(中國石油大學(xué)(華東)計(jì)算機(jī)與通信工程學(xué)院 青島 266555) ②(上海市金融信息技術(shù)研究重點(diǎn)實(shí)驗(yàn)室 上海 200433)
國家自然科學(xué)基金(61309024),上海市金融信息技術(shù)研究重點(diǎn)實(shí)驗(yàn)室開放課題(2015),山東省重點(diǎn)研發(fā)計(jì)劃項(xiàng)目(2015GGX101045)
RFID Mutual Authentication Protocol on Pseudo-random Hash Function with Shared Secrets
-
2.
(College of Computer and Communication Engineering, China University of Petroleum, Qingdao 266555, China)
The National Natural Science Foundation of China (61309024), The Funding of Shanghai Key Laboratory of Financial Information Technology (2015), Shandong Provincial Key Program of Research and Development (2015GGX191945)
-
摘要: 針對資源受限的RFID標(biāo)簽,結(jié)合偽隨機(jī)數(shù)和共享秘密機(jī)制,該文提出一種基于散列函數(shù)的輕量級(jí)雙向認(rèn)證協(xié)議,實(shí)現(xiàn)了后端數(shù)據(jù)庫、閱讀器和標(biāo)簽之間的雙向認(rèn)證。詳細(xì)分析了雙向認(rèn)證協(xié)議的抗攻擊性能和效率性能,并基于BAN邏輯分析方法對協(xié)議模型進(jìn)行了形式化證明。理論分析表明,該文提出的認(rèn)證協(xié)議能夠?qū)崿F(xiàn)預(yù)期安全目標(biāo),抗攻擊性能好,認(rèn)證執(zhí)行效率高且標(biāo)簽開銷小,適用于大數(shù)量的RFID應(yīng)用。
-
關(guān)鍵詞:
- 射頻識(shí)別 /
- 雙向認(rèn)證協(xié)議 /
- 隱私保護(hù) /
- BAN邏輯 /
- 散列函數(shù)
Abstract: Concerning the resource-limited RFID tags, this paper presents a lightweight mutual authentication scheme based on Hash function, combining with the pseudo-random number and shared secret mechanisms, and implements the mutual authentication among the end database, reader and the tags. The anti-attack performance and the overhead of the scheme are analyzed in detail. Afterwards, the protocol security model is formalized using BAN logical analysis method. Theoretical analysis shows that the proposed authentication scheme could achieve the desired security goals, has good anti-attack performance and high efficiency. It can be applied to big population RFID since its low overhead for RFID tags. -
HUANG H F, YU P K, and LIU K C. A privacy and authentication protocol for mobile RFID system[C]. 2014 IEEE International Symposium on Independent Computing, IEEE, Orlando, USA, 2014: 1-6. NYALAMADUGU S, LIU J, and DE VELASCO CORTINA F M. Methods and apparatus for preserving privacy in an RFID system[P]. U.S. Patent 8710960. 2014. LI N, MU Y, SUSILO W, et al. Privacy-preserving Authorized RFID Authentication Protocols[M]. Radio Frequency Identification: Security and Privacy Issues. Springer International Publishing, Berlin, Germany, 2014: 108-122. PERIS-LOPEZ P, ORFILA A, PALOMAR E, et al. A secure distance-based RFID identification protocol with an off-line back-end database[J]. Personal and Ubiquitous Computing, 2012, 16(3): 351-365. HAN S, DILLON T, POTDAR V, et al. RFID mutual authentication protocols for tags and readers with and without a server[J]. Computer Systems Science and Engineering, 2013, 28(2): 91-99. CHO J S, YEO S S, and KIM S K. Securing against brute- force attack: A hash-based RFID mutual authentication protocol using a secret value[J]. Computer Communications, 2011, 34(3): 391-397. CHO J S, JEONG Y S, and PARK S O. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio- frequency identification (RFID) tag mutual authentication protocol[J]. Computers Mathematics with Applications, 2012: 1-8. Kim H. RFID mutual authentication protocol based on synchronized secret[J]. International Journal of Security Its Applications, 2013, 7(4): 37-49. SAFKHANI M, PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, et al. Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol[J]. Journal of Computational and Applied Mathematics, 2014, 259: 571-577. 周曄. 基于Hash鏈的RFID雙向認(rèn)證協(xié)議研究[D]. [碩士論文], 西南交通大學(xué), 2012. ZHOU Y. Research on RFID mutual authentication protocol based on Hash chain[D]. [Master dissertation], South West Jiaotong University, 2012. 丁振華, 李錦濤, 馮波. 基于 Hash 函數(shù)的 RFID 安全認(rèn)證協(xié)議研究[J]. 計(jì)算機(jī)研究與發(fā)展, 2009, 46(4): 583-592. DING Z, LI J, and FENG B. Research on Hash-based RFID security authentication protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592. 孫肖, 趙澤茂. 一種基于哈希函數(shù)的RFID雙向認(rèn)證協(xié)議[J]. 杭州電子科技大學(xué)學(xué)報(bào), 2012, 32(6): 29-32. SUN X and ZHAO Z. A Hash-based mutual authentication protocol for the RFID system[J]. Journal of Hangzhou Dianzi University, 2012, 32(6): 29-32. 蔡豪. RFID安全認(rèn)證協(xié)議的研究與設(shè)計(jì)[D]. [碩士論文], 華中科技大學(xué), 2010. CAI H. Studies on RFID security authentication protocol[D]. [Master dissertation], Huazhong University of Science Technology, 2010. 李斌. RFID安全協(xié)議的研究[D]. [碩士論文], 復(fù)旦大學(xué), 2012. LI B. Research on RFID security protocol[D]. [Master dissertation], Fudan University, 2012. 信息技術(shù)射頻識(shí)別800/900 MHz空中接口協(xié)議[S]. 北京: 中國標(biāo)準(zhǔn)出版社, 2013, GB/T29768-2013. Information technology-radio frequency identification air interface protocol at 800/900 MHz[S]. Beijing: Standards Press of China, 2013, GB/T 29768-2013. WANG J, FLOERKEMEIER C, and SARMA S E. Session-based security enhancement of RFID systems for emerging open-loop applications[J]. Personal and Ubiquitous Computing, 2014, 18(8): 1881-1891. MAMUN M S I and MIYAJI A. A privacypreserving efficient RFID authentication protocol from SLPN assumption[J]. International Journal of Computational Science and Engineering, 2015, 10(3): 234-243. SHOARINEJAD K and SOLTAN M. Systems and methods for RFID security[P]. U.S. Patent Application 14/592,455. 2015-1-8. BURROWS M, ABADI M, and NEEDHAM R M. A logic of authentication[C]. Proceedings of the Royal Society of London. A: Mathematical and Physical Sciences. The Royal Society, London, 1989, 426(1871): 233-271. -