首页 | 本学科首页   官方微博 | 高级检索  
     检索      

可证明安全的射频识别双向认证协议
引用本文:何烜,王红军,袁泉.可证明安全的射频识别双向认证协议[J].空军工程大学学报,2018,19(5):41-46.
作者姓名:何烜  王红军  袁泉
作者单位:国防科技大学电子对抗学院
基金项目:国家自然科学基金(61273302)
摘    要:由于射频识别系统中读写器和标签是在不安全的无线信道中进行通信,而且随着移动读写终端的出现,使得读写器和服务器通信也不安全,容易受到假冒攻击、窃听攻击、中间人攻击等安全威胁,针对此问题提出了基于中国剩余定理的射频识别双向认证协议。该协议利用对称加密、模运算等方式提高信息传输的安全性,引入时间戳来抵抗中间人攻击,并利用中国剩余定理对各方进行认证,最后采用随机更新密钥的方式进行密钥更新,并通过形式化证明的方法和常规攻击分析的方式来验证协议安全性。将该协议与其他协议进行安全性、计算量和存储量的比较,结果表明:文中协议安全性高、计算量小且存储量适中,在射频识别领域安全方面具有一定的应用价值。

关 键 词:射频识别  中国剩余定理  时间戳  BAN逻辑  双向认证

Provable Secure Two-Way Authentication Protocol for Radio Frequency Identification
HE Xuan,WANG Hongjun,YUAN Quan.Provable Secure Two-Way Authentication Protocol for Radio Frequency Identification[J].Journal of Air Force Engineering University(Natural Science Edition),2018,19(5):41-46.
Authors:HE Xuan  WANG Hongjun  YUAN Quan
Institution:School of Electronic Countermeasures, National University of Defense Technology, Hefei 230037,China
Abstract:Aimed at the problems that the reader communication with tags is carried out in insecure wireless channel in the radio frequency identification system, and with the emergence of mobile reader terminals, this makes the communication between the reader and the server unsafe, vulnerable to impersonation attack, eavesdropping attack, middleman attack and other security threats, a two-way authentication protocol for radio frequency identification based on Chinese remainder theorem is proposed. The symmetric encryption and modular operation ways are used to improve the security of information transmission, and the timestamp is adopted to resist the middleman attack in the protocol, and the Chinese remainder theorem is utilized for certificating all sides. Finally, random key update method is used in the key updating. The protocol security is verified by formal proof method and routine attack analysis. The protocol of this paper is compared with other protocols in terms of security, calculation and storage. The results show that the protocol is high in security, less in calculation and moderate in storage, and has certain application value in the security field of radio frequency identification.
Keywords:radio frequency identification  Chinese remainder theorem  timestamp  BAN logic  two-way authentication
本文献已被 CNKI 等数据库收录!
点击此处可从《空军工程大学学报》浏览原始摘要信息
点击此处可从《空军工程大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号