山东大学学报(理学版) ›› 2014, Vol. 49 ›› Issue (09): 154-159.doi: 10.6040/j.issn.1671-9352.2.2014.133
王旭宇, 景凤宣, 王雨晴
WANG Xu-yu, JING Feng-xuan, WANG Yu-qing
摘要: 针对使用无线射频识别技术(RFID)进行认证时存在的安全问题,提出了一种结合Hash函数与时间戳技术的认证协议。将标签的标识和时间戳数据通过Hash函数进行加密传输并进行认证。通过BAN逻辑证明和建立协议的Petri网模型仿真实验证明了该协议具有良好的前向安全性,能有效防止重放、位置跟踪、非法访问等攻击。
中图分类号:
[1] 游战清.无线射频识别技术(RFID)理论与应用[M].北京:电子工业出版社,2004:13-17. YOU Zhanqing. Theory and application of radio frequency identification (RFID) [M]. Beijing: Publishing House of Electronics Industry, 2004:13-17. [2] 康东, 石喜勤, 李勇鹏,等. 射频识别(RFID)核心技术与典型应用开发案例[M].第1版. 北京:人民邮电出版社, 2008:155-156. KANG Dong, SHI Xiqin, LI Yongpeng, et al. Radio frequency identification (RFID) core technology and typical application development case [M]. 1st ed. Beijing: People's Posts and Telecommunications Press, 2008:155-156. [3] SARMA S E, WEIS S A, ENGELS D W. RFID systems and security and privacy implications[C]//Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHE 2002). Berlin: Springer, 2002:454-469 [4] WEIS S A, SARMA S E, RIVEST R L, et al.Security and privacy aspects of low-cost radio frequency identification systems[C]//Proceeding of the1st International Conference on Security in Pervasive Computing. Berlin: Springer, 2003:201-212. [5] HENRICI D, MULLER P.Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers[C]//Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW' 04). Washington: IEEE Computer Society, 2004:149-153. [6] Stuart Haber, W Scott Stornetta. How to time-stamp a digital document [J]. Journal of Cryptology, 1991, 3(2):99-111. [7] 谢晓尧.电子商务网络协议的形式化分析理论与应用[M].北京:科学出版社,2008:15-17. XIE Xiaoyao.The electronic commerce network protocols formal analysis: theory and applications[M]. Beijing: Science Press, 2008: 15-17. [8] 李红静,刘丹.基于矩阵理论的RFID认证协议设计及BAN逻辑分析[J].计算机应用,2013, 33(7):1854-1857. LI Hongjing, LIU Dan. Matrix-based authentication protocol for RFID and BAN logic analysis[J]. Journal of Computer Applications, 2013, 33(7):1854-1857. [9] TSAI J J P, YANG Jennhwa, CHANG Yao-Hsiung. Timing constraint Petri nets and their application to schedulability analysis of real-time system specifications [J]. IEEE Transactions on Software Engineering, 1995, 21(1):32-49. [10] 张兵,马新新,秦志光.基于hash运算的RFID认证协议分析和改进[J].计算机应用研究,2011, 28(11):4311-4314. ZHANG Bing, MA Xinxin, QIN Zhiguang. Analysis and improvement of hash-based RFID authentication protocol[J]. Application Research of Computers, 2011, 28(11): 4311-4314. |
[1] | 万智萍. 一种混合Das协议的无线传感器网络身份验证协议[J]. 山东大学学报(理学版), 2015, 50(05): 12-17. |
[2] | 饶绪黎1,张美平2,许力2. 基于Zigbee技术的RFID读卡系统设计[J]. J4, 2013, 48(7): 62-67. |
[3] | 饶绪黎1,张美平2,马现虎2. 基于物联网技术的实验设备运行监控管理系统设计[J]. J4, 2012, 47(11): 74-77. |
|