全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2012 

基于循环移位的轻量型相互认证协议研究

DOI: 10.3969/j.issn.0372-2112.2012.11.020, PP. 2270-2275

Keywords: 射频识别技术,安全隐私,轻量型认证协议

Full-Text   Cite this paper   Add to My Lib

Abstract:

安全隐私是射频识别系统的关键问题,该文在轻量型相互认证协议的基础上,根据阅读器产生的随机数对将要传送的信息进行循环左移,提出了基于循环移位的轻量型相互认证协议(CSLMAP协议),并用GNY逻辑对协议的安全性进行了证明.结果显示,所提出的CSLMAP协议解决了轻量型相互认证协议中的安全隐私问题,提高了认证协议的执行效率,降低了标签的应用成本.

References

[1]  张学军,蔡文琦,王锁萍.改进型自适应多叉树防碰撞算法研究[J].电子学报,2012,40(1):193-198. Zhang Xue-jun,Cai Wen-qi,Wang Suo-ping.One Anti-collision algorithm based on improved adaptive multi-tree search[J].Acta Electronica Sinica,2012,40(1):193-198.(in Chinese)
[2]  宁焕生,徐群玉.全球物联网发展及中国物联网建设若干思考[J].电子学报,2010,38(11):2590-2599. Ning Huan-sheng,Xu Qun-yu.Research on global internet of things developments and its construction in China[J].Acta Electronica Sinica,2010,38(11):2590-2599.(in Chinese)
[3]  Gong Li,Needham R,Yahalom R.Reasoning about belief in cryptographic protocols .Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy .IEEE Computer Society Press,Los Alamitos,CA.1990:234-248.
[4]  Sarma S E,Weis S A,Engels D W.RFID systems and security and privacy implications .In B.Kaliski,editor,CHES''02,volume 2523 of Lectures Notes in Computer Science .Berlin:Springer-Verlag,2003.454-469.
[5]  S A Weis.Security and privacy in radio-frequency identification devices .Master''s thesis,MIT,Cambridge,MA 02139,May 2003.
[6]  Miyako Ohkubo,Koutarou Suzuki,Shingo Kinoshita.Hash-chain based forward-secure privacy protection scheme for low-cost RFID .Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004) .Sendai,Japan,2004.719-724.
[7]  Pedro Peris-Lopez,Julio Cesar Hernandez-Castro,Juan Estevez-Tapiador,et al.M2AP:A minimalist mutual authentication protocol for low-cost RFID tags .International Conference on Ubiquitous Intelligence and Computing-UIC''06,volume 4159 of Lecture Notes in Computer Science .Berlin:Springer-Verlag,September 2006.912-923.
[8]  Jian Shen,Dongmin Choi,Sangman Moh,et al.A novel anonymous RFID authentication protocol providing strong privacy and security .2010 International Conference on Multimedia Information Networking and Security .Nanjing,China,2010.584-588.
[9]  Myneni S,Misra S,Guoliang Xue.SAMA:Serverless Anonymous mutual authentication for low-cost RFID tags .2011 IEEE International Conference on Communications .Kyoto,Japan,June 2011.1-5.
[10]  Mubarak M F,Manan J A,Yahya S.A critical review on RFID system towards security,trust,and privacy (STP) .IEEE 7th International Colloquium on Signal Processing and its Applications .Penang,Malaysia,Mar.2011.39-44.
[11]  Hoopad Mobahat.Authentication and lightweight cryptography in low cost RFID .2nd International Conference on Software Technology and Engineering .San Juan,PR,Oct.2010(V2):123-129.
[12]  Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.LMAP:A real lightweight mutual authentication protocol for low-cost RFID tags .Proc.Second Workshop on RFID Security .Graz,Austria,July 2006.
[13]  H Y Chien.SASI:A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity [J].IEEE Trans.Dependable and Secure Computing,2007,4(4):337-340.
[14]  Paolo D''Arco,Alfredo De Santis.On ultralightweight RFID authentication protocols [J].IEEE Transactions on Dependable and Secure Computing,2011,8(4):548-563.
[15]  Hung-Min Sun,Wei-Chih Ting,King-Hang Wang.On the security of Chien''s ultralightweight RFID authentication protocol[J].IEEE Transactions on Dependable and Secure Computing,2011,8(2):315-317.
[16]  Tieyan Li,Robert Deng.Vulnerability Analysis of EMAP-An efficient RFID mutual authentication protocol .In IFIP SEC 2007 .sandton,Gauteng,South Africa,May 2007.
[17]  Li T,Deng R H,Wang G.The security and improvement of an ultra-lightweight RFID authentication protocols[J].Security and communication networks,2008,1(2):135-146.
[18]  唐静,姬东耀.基于LPN问题的RFID安全协议设计与分析[J].电子与信息学报,2009,31(2):439-443. Tang Jing,Ji Dong-yao.Design and analysis of security protocols for RFID based on LPN problem[J].Journal of Electronics &Information Technology,2009,31(2):439-443.(in Chinese)

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133