检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:谢海宝 吕磊 XIE Hai-bao;LYU Lei(Information Center,Administration for Market Regulation of Henan Province,Zhengzhou 450008,China;School of Information Science and Engineering,Henan University of Technology,Zhengzhou 450008,China)
机构地区:[1]河南省市场监督管理局信息中心,河南郑州450008 [2]河南工业大学信息科学与工程学院,河南郑州450008
出 处:《计算机技术与发展》2022年第1期128-133,共6页Computer Technology and Development
基 金:国家自然科学基金(61705060)。
摘 要:射频识别系统中电子标签与读写器间基于无线链路交互数据信息,因无线链路自身具有的开放性,使得两者间交互的数据信息易被第三方人员获取,存在一定的安全隐患。为解决该安全问题,文中给出了一种基于伪随机数发生器的认证协议。协议摒弃经典加密算法对信息加密,而是采用伪随机数发生器实现对信息的加密,伪随机数发生器的实现具备时钟周期数少、门电路总数少等优势,能够降低射频识别系统的整体成本;协议为能够有效保持交互数据信息的新鲜性,在数据加密过程中均混入随机数,随机数由随机数产生器产生,具有互异性、不可预测性等优势,在保持信息新鲜性的同时,亦可抵抗第三方人员发起的诸如定位攻击、重放攻击等攻击。将该协议与其他经典协议进行安全及性能对比,表明该协议在可抵抗假冒攻击、异步攻击等常见类型攻击时,还具备较低的成本开销。In RFID system,the interactive data information between the tag and the reader is based on the wireless link.Because of the openness of the wireless link itself,the interactive data information between the tag and the reader is easy to be obtained by the third party.There are some security risks.In order to solve the security problem,an authentication protocol based on pseudo-random number generator is proposed.The protocol abandons the classical encryption algorithm to encrypt the information,but uses the pseudo-random number generator to encrypt the information.The implementation of the pseudo-random number generator has the advantages of less clock cycles and fewer gates,which can reduce the overall cost of the RFID system.In order to effectively maintain the freshness of the interactive data information,the protocol mixes the random number in the data encryption process.The random number is generated by the random number generator,which has the advantages of heterogeneity and unpredictability.While maintaining the freshness of information,it can also resist the attack types such as location attack and replay attack launched by the third party.Compared with other classical protocols in terms of security and performance,it shows that the proposed protocol has lower cost when it can resist common types of attacks such as impersonation attack and asynchronous attack.
关 键 词:物联网 射频识别系统 双向认证 伪随机数发生器 时钟周期数
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.144.91.115