您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

山东大学学报(理学版) ›› 2014, Vol. 49 ›› Issue (09): 154-159.doi: 10.6040/j.issn.1671-9352.2.2014.133

• 论文 • 上一篇    下一篇

一种基于Hash函数的RFID认证改进协议

王旭宇, 景凤宣, 王雨晴   

  1. 贵州师范大学贵州省信息与计算机科学重点实验室, 贵州 贵阳 550001
  • 收稿日期:2014-06-24 修回日期:2014-08-28 出版日期:2014-09-20 发布日期:2014-09-30
  • 通讯作者: 景凤宣(1955-),女,教授,研究方向为信息安全.E-mail:fxj989@gznu.edu.cn E-mail:fxj989@gznu.edu.cn
  • 作者简介:王旭宇(1989-),男,硕士研究生,研究方向为计算机应用.E-mail:2294614510@qq.com
  • 基金资助:
    贵州省科学技术基金资助项目(黔科合J字LKS[2010]37号]);贵阳市科技局工业振兴科技计划项目(筑科合同[2012101]12)

An improved hash-based RFID security authentication algorithm

WANG Xu-yu, JING Feng-xuan, WANG Yu-qing   

  1. Key Laboratory of Information and Computing Science of Guizhou Province, Guizhou Normal University, Guiyang 550001, Guizhou, China
  • Received:2014-06-24 Revised:2014-08-28 Online:2014-09-20 Published:2014-09-30

摘要: 针对使用无线射频识别技术(RFID)进行认证时存在的安全问题,提出了一种结合Hash函数与时间戳技术的认证协议。将标签的标识和时间戳数据通过Hash函数进行加密传输并进行认证。通过BAN逻辑证明和建立协议的Petri网模型仿真实验证明了该协议具有良好的前向安全性,能有效防止重放、位置跟踪、非法访问等攻击。

关键词: Hash函数, 认证协议, RFID

Abstract: To settle the potential security problems during the authentication of radio frequency identification, an authentication protocol combined with Hash function and time stamp was proposed. The tag's identification and time stamp data were encrypted and transmitted through the Hash function, when they were used to authenticate. The ban logic proof and the simulative experiment of established Petri model showe the protocol has good forward security and can prevent replay, location tracking, illegal reading and other illegal attacks.

Key words: RFID, Hash function, authentication protocol

中图分类号: 

  • TP302
[1] 游战清.无线射频识别技术(RFID)理论与应用[M].北京:电子工业出版社,2004:13-17. YOU Zhanqing. Theory and application of radio frequency identification (RFID) [M]. Beijing: Publishing House of Electronics Industry, 2004:13-17.
[2] 康东, 石喜勤, 李勇鹏,等. 射频识别(RFID)核心技术与典型应用开发案例[M].第1版. 北京:人民邮电出版社, 2008:155-156. KANG Dong, SHI Xiqin, LI Yongpeng, et al. Radio frequency identification (RFID) core technology and typical application development case [M]. 1st ed. Beijing: People's Posts and Telecommunications Press, 2008:155-156.
[3] SARMA S E, WEIS S A, ENGELS D W. RFID systems and security and privacy implications[C]//Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHE 2002). Berlin: Springer, 2002:454-469
[4] WEIS S A, SARMA S E, RIVEST R L, et al.Security and privacy aspects of low-cost radio frequency identification systems[C]//Proceeding of the1st International Conference on Security in Pervasive Computing. Berlin: Springer, 2003:201-212.
[5] HENRICI D, MULLER P.Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers[C]//Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW' 04). Washington: IEEE Computer Society, 2004:149-153.
[6] Stuart Haber, W Scott Stornetta. How to time-stamp a digital document [J]. Journal of Cryptology, 1991, 3(2):99-111.
[7] 谢晓尧.电子商务网络协议的形式化分析理论与应用[M].北京:科学出版社,2008:15-17. XIE Xiaoyao.The electronic commerce network protocols formal analysis: theory and applications[M]. Beijing: Science Press, 2008: 15-17.
[8] 李红静,刘丹.基于矩阵理论的RFID认证协议设计及BAN逻辑分析[J].计算机应用,2013, 33(7):1854-1857. LI Hongjing, LIU Dan. Matrix-based authentication protocol for RFID and BAN logic analysis[J]. Journal of Computer Applications, 2013, 33(7):1854-1857.
[9] TSAI J J P, YANG Jennhwa, CHANG Yao-Hsiung. Timing constraint Petri nets and their application to schedulability analysis of real-time system specifications [J]. IEEE Transactions on Software Engineering, 1995, 21(1):32-49.
[10] 张兵,马新新,秦志光.基于hash运算的RFID认证协议分析和改进[J].计算机应用研究,2011, 28(11):4311-4314. ZHANG Bing, MA Xinxin, QIN Zhiguang. Analysis and improvement of hash-based RFID authentication protocol[J]. Application Research of Computers, 2011, 28(11): 4311-4314.
[1] 万智萍. 一种混合Das协议的无线传感器网络身份验证协议[J]. 山东大学学报(理学版), 2015, 50(05): 12-17.
[2] 饶绪黎1,张美平2,许力2. 基于Zigbee技术的RFID读卡系统设计[J]. J4, 2013, 48(7): 62-67.
[3] 饶绪黎1,张美平2,马现虎2. 基于物联网技术的实验设备运行监控管理系统设计[J]. J4, 2012, 47(11): 74-77.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!