《山东大学学报(理学版)》 ›› 2019, Vol. 54 ›› Issue (5): 52-76.doi: 10.6040/j.issn.1671-9352.2.2018.079
Xin-min DAI1(),Xiao-yao XIE2,*()
摘要:
轻量级的射频识别(radio frequency identification,RFID)协议常采用同步更新机制以避免位置隐私的泄露,但却带来了去同步攻击的问题。去同步攻击使得标签与数据库同步更新的秘密数据不一致,导致标签永久失效。通过对已有协议的分析,发现其不具备抵御去同步攻击的效果。对已有协议进行改进,提出了一种新的抗去同步攻击的轻量级双向认证协议,并利用串空间理想诚实理论对新协议进行了形式化分析,证明了新协议的正确性。
中图分类号:
1 | PANG L J, HE L W, PEI Q Q, et al. Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard[C]//2013 IEEE Wireless Communications and Networking Conference (WCNC), Shanghai: IEEE, 2013: 1870-1875. |
2 |
WANG S H , LIU S J , CHEN D W . Security analysis and improvement on two RFID authentication protocols[J]. Wireless Personal Communications, 2015, 82 (1): 21- 33.
doi: 10.1007/s11277-014-2189-x |
3 |
SAFKHANI M , HOSSEINZADEH M , NAMIN M E , et al. On the (Im)possibility of receiving security beyond 2l using an l-bit PRNG[J]. Wireless Personal Communications, 2017, 92 (4): 1591- 1597.
doi: 10.1007/s11277-016-3623-z |
4 | XIAO F , ZHOU Y J , ZHOU J X , et al. Security protocol for RFID system conforming to EPC-C1 G2 standards[J]. Journal of Computers, 2013, 8 (3): 605- 612. |
5 | ABDOLMALEKI B, BAGHERY K, AKHBARI B, et al. Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard[C]//2016 8th International Symposium on Telecommunications (IST), Iran:IEEE, 2016:111-116. |
6 | DELVAUX J , PEETERS R , GU D W , et al. A survey on lightweight entity authentication with strong PUFs[J]. ACM Computing Surveys, 2015, 48 (2): 1- 42. |
7 | BOLOTNYY L, ROBINS G. Physically unclonable function-based security and privacy in RFID systems[C]//Fifth Annual IEEE International Conference on Pervasive Computing and Communications. New York: IEEE, 2007: 211-220. |
8 | KULSENG L, YU Z, WEI Y W, et al. Lightweight mutual authentication and ownership transfer for RFID systems[C]//2010 Proceedings IEEE INFOCOM Conference. San Diego: IEEE, 2010: 1-5. |
9 | KARDAS S, AKGÜN M, KIRAZ M S, et al. Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems[C]//2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications. Istanbul: IEEE, 2011: 20-25. |
10 | BASSIL R, EL-BEAINO W, KAYSSI A, et al. A PUF-based ultra-lightweight mutual-authentication RFID protocol[C]//Internet Technology and Secured Transactions (ICITST). New York: IEEE, 2011: 495-499. |
11 |
李晖, 夏伟, 邓冠阳, 等. 超轻量级双向认证协议PUMAP的安全性分析[J]. 北京理工大学学报, 2013, 33 (12): 1259- 1262.
doi: 10.3969/j.issn.1001-0645.2013.12.010 |
LI Hui , XIA Wei , DENG Guanyang , et al. Security analysis of a PUF based ultra-lightweight mutual authentication RFID protocol-PUMAP[J]. Transactions of Beijing Institute of Technology, 2013, 33 (12): 1259- 1262.
doi: 10.3969/j.issn.1001-0645.2013.12.010 |
|
12 |
徐旭光, 欧毓毅, 凌捷, 等. 基于PUF的轻量级RFID安全认证协议[J]. 计算机应用与软件, 2014, 31 (11): 302- 306.
doi: 10.3969/j.issn.1000-386x.2014.11.077 |
XU Xuguang , OU Yuyi , LING Jie , et al. Lightweight rfid secure authentication protocol based on puf[J]. Computer Applications and Software, 2014, 31 (11): 302- 306.
doi: 10.3969/j.issn.1000-386x.2014.11.077 |
|
13 | 寇红召, 张紫楠, 马骏, 等. 基于物理不可克隆函数的RFID双除认证[J]. 计算机工程, 2013, 39 (6): 142- 145. |
KOU Hongzhao , ZHANG Zinan , MA Jun , et al. RFID mutual authentication based on physical unclonable function[J]. Computer Engineering, 2013, 39 (6): 142- 145. | |
14 | 柳毅, 顾国生. 一种新的轻量级RFID双向认证协议[J]. 计算机科学, 2017, 44 (2): 206- 208, 227. |
LIU Yi , GU Guosheng . New mutual authentication for lightweight RFID protocols[J]. Computer Science, 2017, 44 (2): 206- 208, 227. | |
15 | THAYER FÁBREGA F J , HERZOG J C , GUTTMAN J D . Strand spaces: proving security protocols correct[J]. Journal of Computer Security, 1999, 7 (2/3): 191- 230. |
16 | THAYER F F J, HERZOG J C, GUTTMAN J D. Honest ideals on strand spaces[C]//Proceedings of 11th IEEE ComputerSecurity Foundations Workshop. Rockport: IEEE, 1998: 66-77. |
[1] | 孟博,鲁金钿,王德军,何旭东. 安全协议实施安全性分析综述[J]. 山东大学学报(理学版), 2018, 53(1): 1-18. |
|