RFID距离约束协议的分析与设计  被引量:1

Analysis and Design of Distance-Bounding Protocols for RFID

在线阅读下载全文

作  者:辛伟[1,2] 孙惠平[2] 陈钟[1,2] 

机构地区:[1]北京大学信息科学技术学院,北京100871 [2]高可信软件技术教育部重点实验室(北京大学),北京100871

出  处:《计算机研究与发展》2013年第11期2358-2366,共9页Journal of Computer Research and Development

基  金:国家自然科学基金项目(61170263)

摘  要:中继攻击给无线射频识别(RFID)安全带来了巨大威胁,攻击者通过原封不动地转发RFID读写器和标签的通信消息的方式,增加了读写器和标签通信的距离,破坏了RFID默认为短距离通信的隐含假设.而抵御中继攻击的主要方法是采用基于测量读写器与标签之间通信时间的距离约束协议,Hancke和Kuhn在2005年提出了第1个RFID距离约束协议HK,自此以后,陆续有新的距离约束协议问世.目的就是设计一个距离约束协议来抵御中继攻击,同时该协议适合于RFID标签计算资源有限的特点.首先回顾了已有的各种距离约束协议,分析了这些协议的优点和缺陷,并提出了针对距离约束协议的攻击模型,最后,基于HK协议,提出了一个新的距离约束协议HKM,该协议采用预定义质询和随机质询相结合的方式,并充分利用了HK协议浪费的内存,通过与现有的几个典型的距离约束协议进行对比,该协议在内存消耗和抵御中继攻击两个方面有较好的表现.Relay attacks pose a serious threat to the security of radio frequency identification systems. The adversary manipulates the communication by only relaying the verbatim messages between a reader and a tag in order to increase the communication distance between them, which breaks the implicit assumption that a tag is actually within a very short distance of a reader. The main countermeasure against relay attacks is the use of distance bounding protocols measuring the round- trip time between the reader and the tag. In 2005, Hancke and Kuhn proposed the first distance- bounding protocol dedicated to RFID system named HK. From then on, a number of relative schemes have been proposed subsequently in literature. In this paper, we design a distance-bounding protocol suited for computation limited RFID tags against relay attacks. We firstly review the existing RFID distance-bounding protocols. Weaknesses and advantages in these protocols are examined. In addition, we propose an attack model for designing and analyzing RFID distance-bounding protocols. Finally, we propose a novel distance bounding protocol based on HK protocol named HKM. It mixes the predefined challenge and the random challenge, and takes advantage of the wasting memory of HK protocol. Compared with the existing distance bounding protocols, HKM has good performance in both memory consuming and resistance to relay attacks.

关 键 词:RFID 中继攻击 距离约束协议 安全与隐私 攻击模型 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象