全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

PUF-HB#:轻量级RFID双向认证协议

DOI: 10.13190/j.jbupt.2013.06.003, PP. 13-17

Keywords: 无线射频识别,轻量级,物理不可克隆函数,双向认证

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了实现对低成本标签的认证和隐私保护,提出了轻量级无线射频识别(RFID)双向认证协议.利用HB#协议通信量和存储量较小的特性,结合物理不可克隆函数防止标签被克隆,认证结束后进行密钥更新防范位置追踪.分析结果表明,该协议实现了标签与阅读器间的双向认证,不仅具有HB#协议的安全特性,还具有抵抗克隆攻击、内存读取攻击、保护隐私安全等特性,同时可以减轻阅读器搜索密钥的负担.

References

[1]  邓淼磊, 朱昭, 石金娥, 等. RFID标签的不可追踪性[J]. 北京邮电大学学报, 2010, 33(2): 44-47. Deng Miaolei, Zhu Zhao, Shi Jin'e, et al. Untrace-ability of RFID tags[J]. Journal of Beijing University of Posts and Telecommunications, 2010, 33(2): 44-47.
[2]  Hopper N J, Blum M. Secure human identification protocols[J]. Lecture Notes in Computer Science, 2001(2248): 52-66.
[3]  Juels A, Weis S. Authenticating pervasive devices with human protocols[J]. Lecture Notes in Computer Science, 2005(3126): 293-308.
[4]  Gilbert H, Robshaw M, Sibert H. HB#: increasing the security and efficiency of HB+[C]//Advances in Cryptology-EUROCRYPT 2008. Istanbul: Springer Press, 2009: 361-378.
[5]  Berlekamp E R, Mceliece R J, Tilborg H C. On the inherent intractability of certain coding problems[J]. IEEE Transactions on Information Theory, 1978, 24(3): 384-386.
[6]  Halevi T, Saxena N, Halevi S. Using HB family of protocols for privacy-preserving authentication of RFID tags in a population[C]//RFIDsec 2009. Leuven: arXiv Press, 2009: 1-15.
[7]  Ouafi K, Overbeck R, Vaudenay S. On the security of HB# against a man-in-the-middle attack[J]. Lecture Notes in Computer Science, 2008(5350): 108-124.
[8]  Avoine G, Martin B, Martin T. Tree-based RFID authentication protocols are definitively not privacy friendly[J]. Lecture Notes in Computer Science, 2010(6370): 103-122.
[9]  Gassend B, Clarke D, Dijk M V, et al. Silicon physical random functions[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security (2002). Washington, DC: ACM Press, 2002: 148-160.
[10]  Lee J W, Lim D, Gassend B, et al. A technique to build a secret key in integrated circuits with identification and authentication applications[C]//VLSI Circuits (2004). Honolulu: IEEE Press, 2004: 176-179.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133