一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

基于共享秘密的偽隨機(jī)散列函數(shù)RFID雙向認(rèn)證協(xié)議

石樂義 賈聰 宮劍 劉昕 陳鴻龍

石樂義, 賈聰, 宮劍, 劉昕, 陳鴻龍. 基于共享秘密的偽隨機(jī)散列函數(shù)RFID雙向認(rèn)證協(xié)議[J]. 電子與信息學(xué)報(bào), 2016, 38(2): 361-366. doi: 10.11999/JEIT150653
引用本文: 石樂義, 賈聰, 宮劍, 劉昕, 陳鴻龍. 基于共享秘密的偽隨機(jī)散列函數(shù)RFID雙向認(rèn)證協(xié)議[J]. 電子與信息學(xué)報(bào), 2016, 38(2): 361-366. doi: 10.11999/JEIT150653
SHI Leyi, JIA Cong, GONG Jian, LIU Xin, CHEN Honglong. RFID Mutual Authentication Protocol on Pseudo-random Hash Function with Shared Secrets[J]. Journal of Electronics & Information Technology, 2016, 38(2): 361-366. doi: 10.11999/JEIT150653
Citation: SHI Leyi, JIA Cong, GONG Jian, LIU Xin, CHEN Honglong. RFID Mutual Authentication Protocol on Pseudo-random Hash Function with Shared Secrets[J]. Journal of Electronics & Information Technology, 2016, 38(2): 361-366. doi: 10.11999/JEIT150653

基于共享秘密的偽隨機(jī)散列函數(shù)RFID雙向認(rèn)證協(xié)議

doi: 10.11999/JEIT150653
基金項(xiàng)目: 

國家自然科學(xué)基金(61309024),上海市金融信息技術(shù)研究重點(diǎn)實(shí)驗(yàn)室開放課題(2015),山東省重點(diǎn)研發(fā)計(jì)劃項(xiàng)目(2015GGX101045)

RFID Mutual Authentication Protocol on Pseudo-random Hash Function with Shared Secrets

Funds: 

The National Natural Science Foundation of China (61309024), The Funding of Shanghai Key Laboratory of Financial Information Technology (2015), Shandong Provincial Key Program of Research and Development (2015GGX191945)

  • 摘要: 針對資源受限的RFID標(biāo)簽,結(jié)合偽隨機(jī)數(shù)和共享秘密機(jī)制,該文提出一種基于散列函數(shù)的輕量級(jí)雙向認(rèn)證協(xié)議,實(shí)現(xiàn)了后端數(shù)據(jù)庫、閱讀器和標(biāo)簽之間的雙向認(rèn)證。詳細(xì)分析了雙向認(rèn)證協(xié)議的抗攻擊性能和效率性能,并基于BAN邏輯分析方法對協(xié)議模型進(jìn)行了形式化證明。理論分析表明,該文提出的認(rèn)證協(xié)議能夠?qū)崿F(xiàn)預(yù)期安全目標(biāo),抗攻擊性能好,認(rèn)證執(zhí)行效率高且標(biāo)簽開銷小,適用于大數(shù)量的RFID應(yīng)用。
  • HUANG H F, YU P K, and LIU K C. A privacy and authentication protocol for mobile RFID system[C]. 2014 IEEE International Symposium on Independent Computing, IEEE, Orlando, USA, 2014: 1-6.
    NYALAMADUGU S, LIU J, and DE VELASCO CORTINA F M. Methods and apparatus for preserving privacy in an RFID system[P]. U.S. Patent 8710960. 2014.
    LI N, MU Y, SUSILO W, et al. Privacy-preserving Authorized RFID Authentication Protocols[M]. Radio Frequency Identification: Security and Privacy Issues. Springer International Publishing, Berlin, Germany, 2014: 108-122.
    PERIS-LOPEZ P, ORFILA A, PALOMAR E, et al. A secure distance-based RFID identification protocol with an off-line back-end database[J]. Personal and Ubiquitous Computing, 2012, 16(3): 351-365.
    HAN S, DILLON T, POTDAR V, et al. RFID mutual authentication protocols for tags and readers with and without a server[J]. Computer Systems Science and Engineering, 2013, 28(2): 91-99.
    CHO J S, YEO S S, and KIM S K. Securing against brute- force attack: A hash-based RFID mutual authentication protocol using a secret value[J]. Computer Communications, 2011, 34(3): 391-397.
    CHO J S, JEONG Y S, and PARK S O. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio- frequency identification (RFID) tag mutual authentication protocol[J]. Computers Mathematics with Applications, 2012: 1-8.
    Kim H. RFID mutual authentication protocol based on synchronized secret[J]. International Journal of Security Its Applications, 2013, 7(4): 37-49.
    SAFKHANI M, PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, et al. Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol[J]. Journal of Computational and Applied Mathematics, 2014, 259: 571-577.
    周曄. 基于Hash鏈的RFID雙向認(rèn)證協(xié)議研究[D]. [碩士論文], 西南交通大學(xué), 2012.
    ZHOU Y. Research on RFID mutual authentication protocol based on Hash chain[D]. [Master dissertation], South West Jiaotong University, 2012.
    丁振華, 李錦濤, 馮波. 基于 Hash 函數(shù)的 RFID 安全認(rèn)證協(xié)議研究[J]. 計(jì)算機(jī)研究與發(fā)展, 2009, 46(4): 583-592.
    DING Z, LI J, and FENG B. Research on Hash-based RFID security authentication protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.
    孫肖, 趙澤茂. 一種基于哈希函數(shù)的RFID雙向認(rèn)證協(xié)議[J]. 杭州電子科技大學(xué)學(xué)報(bào), 2012, 32(6): 29-32.
    SUN X and ZHAO Z. A Hash-based mutual authentication protocol for the RFID system[J]. Journal of Hangzhou Dianzi University, 2012, 32(6): 29-32.
    蔡豪. RFID安全認(rèn)證協(xié)議的研究與設(shè)計(jì)[D]. [碩士論文], 華中科技大學(xué), 2010.
    CAI H. Studies on RFID security authentication protocol[D]. [Master dissertation], Huazhong University of Science Technology, 2010.
    李斌. RFID安全協(xié)議的研究[D]. [碩士論文], 復(fù)旦大學(xué), 2012.
    LI B. Research on RFID security protocol[D]. [Master dissertation], Fudan University, 2012.
    信息技術(shù)射頻識(shí)別800/900 MHz空中接口協(xié)議[S]. 北京: 中國標(biāo)準(zhǔn)出版社, 2013, GB/T29768-2013.
    Information technology-radio frequency identification air interface protocol at 800/900 MHz[S]. Beijing: Standards Press of China, 2013, GB/T 29768-2013.
    WANG J, FLOERKEMEIER C, and SARMA S E. Session-based security enhancement of RFID systems for emerging open-loop applications[J]. Personal and Ubiquitous Computing, 2014, 18(8): 1881-1891.
    MAMUN M S I and MIYAJI A. A privacypreserving efficient RFID authentication protocol from SLPN assumption[J]. International Journal of Computational Science and Engineering, 2015, 10(3): 234-243.
    SHOARINEJAD K and SOLTAN M. Systems and methods for RFID security[P]. U.S. Patent Application 14/592,455. 2015-1-8.
    BURROWS M, ABADI M, and NEEDHAM R M. A logic of authentication[C]. Proceedings of the Royal Society of London. A: Mathematical and Physical Sciences. The Royal Society, London, 1989, 426(1871): 233-271.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  1497
  • HTML全文瀏覽量:  124
  • PDF下載量:  431
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2015-06-01
  • 修回日期:  2015-11-08
  • 刊出日期:  2016-02-19

目錄

    /

    返回文章
    返回