检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:周静 董国超 邓祖强 张金娈 刘超[3,4] 牛永亮 ZHOU Jing;DONG Guo-chao;DENG Zu-qiang;ZHANG Jin-luan;LIU Chao;NIU Yong-liang(NARI Group Co. Ltd. (State Grid Electric Power Research Institute Co. Ltd.), Nanjing 210061, China;Beijing Energy Technology Branch, NARI Technology Co. Ltd., Beijing 100085, China;Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China;Center for Network and Information Education Technology, Shanxi University of Finance and Economics, Taiyuan 030006, China)
机构地区:[1]南瑞集团有限公司(国网电力科学研究院有限公司),江苏南京210061 [2]国电南瑞科技股份有限公司北京能源科技分公司,北京100085 [3]中国科学院信息工程研究所,北京100093 [4]中国科学院大学网络空间安全学院,北京100049 [5]山西财经大学网络与信息教育技术中心,山西太原030006
出 处:《计算机与现代化》2021年第3期46-50,共5页Computer and Modernization
基 金:南瑞集团有限公司科技项目(524608200058)。
摘 要:射频识别(RFID)技术在物联网领域得到广泛的运用,但是RFID系统在信息传输过程中容易被窃取和伪造,RFID系统已经暴露出严重的安全问题。针对目前主流的Hash链协议簇存在的假冒攻击问题,提出一种基于随机Hash链的双向安全认证协议。在双向认证过程中,阅读器通过识别随机数K的数值来验证响应报文的有效性,标签通过检测回传报文的标签属性检测阅读器的合法性,阅读器通过检测标签预置身份来防止标签被假冒,保障数据在系统中的真实性,可有效提高系统的前向安全、防伪造与防位置跟踪等安全特性。最后本文使用BAN逻辑对提出的双向安全认证协议进行安全验证,实验结果表明标签与阅读器之间具有可相互认证的安全性。Radio Frequency IDentification(RFID)technology is widely used in the field of Internet of Things.But the RFID system is easy to be stolen and forged during the information transmission process,RFID system has exposed serious security problems.Aiming at the problem of counterfeit attacks in the current mainstream Hash chain protocol cluster,a two-way security authentication protocol based on random Hash chain is proposed.In the process of mutual authentication,the reader verifies the validity of the response message by identifying the value of the random number K,the tag detects the legitimacy of the reader by detecting the tag attributes of the returned message,the reader prevents the label from being counterfeited by detecting the preset identity of the label and ensure the authenticity of data in the system.It can effectively improve the system's forward security,anti-counterfeiting and anti-location tracking and other security features.Finally,this paper uses BAN logic to perform security verification on the proposed protocol,the experimental results show that there is the security of mutual authentication between the tag and the reader.
分 类 号:TP306[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.141.28.197