首页 | 官方网站   微博 | 高级检索  
     

能抵抗拒绝服务攻击且高效的RFID安全认证协议
引用本文:史长琼,吴 丹,肖瑞强.能抵抗拒绝服务攻击且高效的RFID安全认证协议[J].计算机工程与应用,2016,52(2):105-111.
作者姓名:史长琼  吴 丹  肖瑞强
作者单位:长沙理工大学 计算机与通信工程学院,长沙 410114
摘    要:针对现有的RFID认证协议所面临的安全隐私保护问题,利用Hash函数加密的方法,提出了一种能抵抗拒绝服务攻击且高效的RFID安全认证协议。通过在阅读器上进行随机数的比较与识别,从而使该协议可抵抗拒绝服务攻击,并且在后台数据库中存储标签标识符的两种状态,以便实现电子标签与后台数据库的数据同步。从理论上分析了协议的性能和安全性,并利用BAN逻辑对协议的安全性进行了形式化证明。分析结果表明,该协议能够有效地实现阅读器和电子标签之间的相互认证,能有效地抵抗拒绝服务攻击且与其他协议比较,整个RFID系统的计算量减小,适用于大规模使用标签的RFID系统。

关 键 词:射频识别  安全认证协议  数据同步  拒绝服务攻击  BAN逻辑  

Resistance to denial of service attacks and efficient RFID security authentication protocol
SHI Changqiong,WU Dan,XIAO Ruiqiang.Resistance to denial of service attacks and efficient RFID security authentication protocol[J].Computer Engineering and Applications,2016,52(2):105-111.
Authors:SHI Changqiong  WU Dan  XIAO Ruiqiang
Affiliation:School of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha 410114, China
Abstract:Aiming at security and privacy protection problems faced in the existing RFID authentication protocol, this paper proposes a efficient RFID security authentication protocol based on Hash which can resist the denial of service attack. Using the comparison and recognition of random number on the reader, the protocol can resist the denial of service attacks. And two states of label identifier are stored in the database, in order to realize the electronic tag and the backend database data synchronization. Meanwhile, this paper theoretically analyzes the performance and security of the protocol, and the security of the protocol is formally proved by BAN logic. The analysis shows that the protocol can achieve effective mutual authentication between reader and electronic tag, and it can effectively resist the denial of service attack, and compared with other protocols it reduces the amount of calculation of RFID system. It is suitable for large-scale RFID system using electronic tags.
Keywords:radio frequency identification  security authentication protocol  data synchronization  denial of service attack  BAN logic  
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号