检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:王沅 龙桂铃 Wang Yuan;Long Guiling(Department of Public Security Management,Inner Mongolia Police Professional College,Hohhot 010000,Inner Mongolia,China;Center of Network and Education Technology,Yichun University,Yichun,336000,Jiangxi,China)
机构地区:[1]内蒙古警察职业学院公安管理系,内蒙古呼和浩特010000 [2]宜春学院网络与教育技术中心,江西宜春336000
出 处:《计算机应用与软件》2021年第6期318-323,共6页Computer Applications and Software
基 金:江西省教育厅科技项目(GJJ161042,GJJ161677)。
摘 要:针对文献[13]提出的RFID认证协议存在无法抗异步攻击的缺陷,在此协议基础上,设计一种能抵抗异步攻击的认证协议。该协议摒弃原协议采用的哈希函数加密策略,选择超轻量级的字合成运算对传送消息进行加密;设计协议为能够抵抗异步攻击,前后两次通信认证用到的共享密钥均存放于读写器中,标签一端引入计数器Q对最后一轮读写器发送给标签的消息进行计数。基于逻辑BAN形式化分析协议,给出严谨的推理过程;基于安全性分析,表明该协议具备一定的安全性;基于性能对比,说明其能够适用于当前低成本的系统中。According to the defect that the RFID authentication protocol proposed in Literature[13]can not resist the asynchronous attack,We design an authentication protocol based on this protocol to resist the asynchronous attack.The proposed protocol abandoned the hash function encryption strategy adopted by the original protocol and chooses the ultra-lightweight word synthesis operation to encrypt the transmitted message.In order to resist the asynchronous attack,the shared keys used in two communication authentication sessions that stored in the reader and the counter Q was introduced at the label end to send the last round of reader and writer.Messages sent to labels were counted.Based on the formal analysis protocol of logical BAN,a rigorous reasoning process is given;based on security analysis,the protocol has certain security;based on performance comparison,it can be applied to current low-cost systems.
关 键 词:物联网 射频识别系统 异步攻击 认证协议 计数器 BAN逻辑
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.49