检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:潘涛[1] 左开中 王涛春 黄重春 Pan Tao;Zuo Kaizhong;Wang Taochun;Huang Zhongchun(School of Internet&Communication,Anhui Technical College of Mechanical&Electrical Engineering,Wuhu Anhui 241002,China;School of Computer&Information,Anhui Normal University,Wuhu Anhui 241002,China;Anhui Key Laboratory of Network&Information Security,Wuhu Anhui 241002,China)
机构地区:[1]安徽机电职业技术学院互联网与通信学院,安徽芜湖241002 [2]安徽师范大学计算机与信息学院,安徽芜湖241002 [3]网络与信息安全安徽省重点实验室,安徽芜湖241002
出 处:《计算机应用研究》2023年第2期595-600,共6页Application Research of Computers
基 金:国家自然科学基金资助项目(61972438);安徽省自然科学基金资助项目(2108085MF219);安徽省质量工程项目技术技能型大师工作室项目(2019dsgzs42);安徽省质量工程项目人工智能专业群建设项目(2020zyq22)。
摘 要:移动RFID的无线通信与移动应用给认证提出更高要求,针对当前移动RFID认证协议安全性不强及认证效率不高的问题,提出移动RFID高效率认证协议。协议通过执行算术运算、按位运算及数据排列组合,保证了信息传输安全;通过后台数据库和移动阅读器对随机数的递进式验证,标签对随机数的捆绑式验证,有效防范敌手攻击。由于通信实体均执行轻量级运算,大幅提高系统计算性能;通信实体的递进式验证实现了对标签数据的初步筛选,缩短了无效认证时间,提高了认证效率。利用GNY形式化语言对协议正确性进行了证明。理论分析表明,该协议可抵御多种类型攻击。仿真结果显示,与同类移动RFID认证协议相比,该协议认证效率高,应用价值好。Wireless communication and mobile application put forward higher requirement for mobile RFID authentication.Aiming at the security and efficiency problem of the existing authentication protocol,this paper proposed a new mobile RFID high-efficiency authentication protocol.The protocol protected the security of information transmission by using arithmetic ope-ration,bit-wise operations,permutation and combination of bits data.It defended the illegal attack by adversary through the progressive verification of random number by database and mobile reader,as well as bundled verification by the tag.For one thing,as the communication entity performed light-weight operations,it greatly reduced the amount of calculation.For ano-ther,as the communication entity initially verified the authenticity and legitimacy of random data in time,it reduced time of the invalid authentication.These two points showed that the protocol could improve the authentication efficiency.This paper proved the correctness of the protocol using GNY logic formal language.Analysis results show that the protocol can resist different types of attacks.Simulation results show that the protocol has high authentication efficiency as compared with similar mobile RFID authentication protocols.The protocol has better application value.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.188.148.202