检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]华北电力大学新能源电力系统国家重点实验室,保定071003
出 处:《密码学报》2014年第5期456-464,共9页Journal of Cryptologic Research
基 金:中央高校基本科研业务费(20132667)
摘 要:随着RFID系统的广泛应用,系统安全问题日益突出.认证协议是一种面向应用层的协议,防止攻击者对敏感数据进行窃取,保证通信内容的完整性.由于无源RFID标签内存和容量的限制,使得目前通用的无线传感器网络中的安全协议在RFID系统不能直接使用.本文首先分析现有的基于密码学的认证协议和基于Hash函数的4种典型的RFID认证协议,包括Hash锁协议、随机化Hash锁协议、Hash链协议、基于Hash函数的ID变化协议的特点和缺陷,针对构架于物联网开放的EPC服务环境,提出了一种新的基于非对称密钥和Hash函数的双向认证协议,并给出了标签生成数字串和读写器生成数字串两种更新方案.该协议通过私钥对读写器的身份进行验证,使读写器与数据库相互独立;利用Hash函数对随机数字串进行运算来认证标签,保证了标签的前向安全性;运用BAN逻辑的形式化分析方法,对该协议的安全性进行了推导证明.通过对几种基于Hash函数认证协议的标签计算时间、读写器计算时间、数据库计算复杂度、标签存储容量4种性能对比分析表明,该协议实现复杂度低,更适合低成本、多用户系统使用.With the widely use of RFID systems, their security problem is becoming prominent. Authentication protocols are a kind of application oriented protocols, preventing the attackers to steal sensitive data, ensuring the integrity of the communication content. Because of the resource limitation of passive RFID tags, the general security protocols in wireless sensor networks cannot be used directly in the RFID systems. By discussingcryptography protocols and four kinds of typical RFID authentication protocol based on the Hash function, Hash-Lock protocol, Random Hash-Lock protocol, Hash-chain protocol, Hash-based Variation protocol, and based on the characteristics and defects of them, and aiming at the architecture in open EPC service environment in the internet of things, this paper proposed a new mutual authentication protocol based on asymmetric keys and Hash functions, which gives the two schemes for the tags to update the number list and for the reader to update the number list. The protocol takes advantage of the private key to verify the identity of the reader, which ensures the reader and the database to be independent of each other. Hash algorithms are used on the random number list to identify the tags, which provide the forward security. The protocol uses BAN logic formalized analysis method to prove the security. According to the comparison on 4 kinds of performance, the tag computation time, the reader computation time, computational complexity of the database, tag storage capacity of 4 kinds of authentication protocol based on the Hash function, the protocol implementation complexity is low and is more suitable for low cost multi-user system.
关 键 词:HASH函数 非对称密钥 RFID认证 BAN逻辑
分 类 号:TN918.4[电子电信—通信与信息系统] TP391.44[电子电信—信息与通信工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.216.130.198