首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
《现代电子技术》2017,(17):86-90
组证明(Grouping-proof)协议的目的是证明阅读器扫描范围内待扫描标签组内标签是否同时存在。随着标签组和组内标签数量的增长,协议中存在的计算时间复杂度、通信总量、组证明生成机制和标签干扰等制约扩展性的因素严重影响了生成有效组证明的成功率。通过比较分析相关协议,设计了一个适用于大规模标签组的只需简单异或和伪随机运算的轻量级组证明协议。在相同的假设模型下,协议能抵抗常见安全攻击,满足强隐私特性的同时,符合超高频段低成本被动式标签的硬件成本要求,具有更高的执行效率。  相似文献   

2.
The trend of researching group radio frequency identification devices(RFID) authentication protocol has become increasingly popular in recent years. One of the newest work in this area is from Batina and Lee, they presented a privacy-preserving multi-players grouping-proof protocol based on the elliptic curve cryptography(ECC), and claimed their protocol have the ability to resist five potential attacks, including compromised tag attack, man-in-the-middle attack, colluding tags attack, etc. In this paper, we first take a counterexample to demonstrate their protocol is vulnerable to compromised tag attack. Then we propose a novel secure RFID authentication protocol, and analyze its security by merging formal analysis, provable security, and mathematical inductive method, so as to solve the weakness of Batina and Lee's work. Furthermore, compared with another two classic protocols(secure ownership transfer protocol(SOTP) and secure multiple group ownership transfer protocol(SMGOTP)), the performance analysis show that our protocol provides not only a lower tags' communication cost at about 50.0% and 14.3%, but also a lower reader's computation cost(approximate 14.5% and 55.1% respectively), when transferring a large number of tags.  相似文献   

3.
陈卓 《电子测试》2016,(18):40-41
为了保证RFID系统的信息安全,本文在分析现有RFID认证协议的基础上,提出一种基于Grain-Mac流密码加密算法的双向安全认证协议,采用流密码和密钥动态更新的方法实现了标签与阅读器的双向认证。仿真结果表明,该协议成本低、效率高、安全性好,且能够有效抵抗拒绝服务攻击,达到了预期的效果。  相似文献   

4.
《电子设计技术》2004,11(11):28
EM Microelectronic公司推出了一个基于13.56MHz技术的高频RFID标准产品系列,该系列支持加密功能,适用于需要增强安全性的场合,如安全和接入控制、时间和出勤率跟踪以及资产管理.该系列包括EM4035、EM4135、EM4034和EM4094 4种器件,符合ISO15693标准,能读出相距1m远的标签,典型读出速度是每秒20~40张标签.  相似文献   

5.
Radio Frequency Identification (RFID) is a relatively new technology. In recent years, it has been shown to be convenient and feasible in many applications. However, there are security issues which need to be addressed. Due to the wireless transmission of the RFID system, malicious people can gain the information in the RFID tags, and the user’s privacy is invaded. Although there have been many protection methods proposed for RFID security, the system has remained vulnerable to various attacks. In this paper, we propose a conforming of the EPCglobal Class 1 Generation 2 standards RFID ownership transfer protocol with provable security. The proposed scheme can resist several attacks and ensure a secure transaction.  相似文献   

6.
In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. an attacker that has no access to the internal data of a tag, is able to impersonate a legitimate reader/server, and to desynchronize a tag. The attack is very efficient and has minimal computational complexity. Finally, we propose a simple solution to fix the flaw.  相似文献   

7.
针对物联网中感知层RFID系统信息及用户隐私易被泄露等问题,提出一种基于动态密钥轻量级RFID安全认证协议。该协议利用标签及读写器自身产生的随机数、CRC编码函数及一定算法生成动态密钥,并利用该密钥及加密算法来加密认证过程中的重要参数,确保数据传输过程中的机密性。运用BAN逻辑形式化分析方法对该协议安全性进行证明。通过对该协议的安全性、复杂性分析表明,该协议安全、可靠,运行效率较高,适合低成本RFID系统对应用安全的需要。  相似文献   

8.
Dinarvand  Negin  Barati  Hamid 《Wireless Networks》2019,25(1):415-428
Wireless Networks - Radio frequency identification (RFID) is a relatively new technology widely deployed in many applications. Due to several advantages of the technology including decreased costs...  相似文献   

9.
During the radio‐frequency identification authentication process, it is of great significance to quickly find out the target tag from all tags stored in the database, because it affects the authentication performance to a great extent. Most of the existing schemes use the Hash or pseudorandom number generator operation to locate the target tag, but if the number of tags is extremely large, vast Hash or pseudorandom number generator operations may take much time and lower the authentication efficiency. To locate the target tag quickly, the RAP and LADP protocols adopt the simple value comparison method, and the back‐end server can easily find the target tag by directly comparing the received index‐pseudonym value with those stored in the database. This method does improve the authentication performance, but it results that these schemes suffer from the tag tracking attack. Motivated by these concerns, we propose a novel tag indexing method called the two‐layer tag indexing mechanism, and at the same time, we give a lightweight radio‐frequency identification authentication protocol based on it. Analyses show that our scheme can effectively resist the tag tracking attack and is almost as efficient as the RAP and LADP protocols in indexing tags. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

10.
Most vehicles are now produced with infotainment features. However, as reported in various security conferences, security vulnerabilities associated with an infotainment system can cause serious security issues, e.g., an attacker can control in-vehicle systems through the infotainment system. To address such security issues, in this paper, we propose a session key establishment protocol using Elliptic Curve Cryptography. The proposed protocol enables secure authentication and key distribution between a user device and a telematics control unit. We also shows how a trusted execution environment is used for the proposed protocol. We present detailed protocol operations with conducted security analysis results.  相似文献   

11.
In vehicular ad-hoc networks (VANETs), vehicles perform a handover procedure in order to connect to the next RSU. In general, the handover procedure comprises two stages, namely searching for an appropriate road side unit (RSU) to connect to and performing an authentication procedure with the selected RSU. Since the vehicles in a VANET typically have a high mobility, frequent handover operations are required, and thus the transmission delay is inevitably increased. Accordingly, this paper proposes an authentication method designated as LIAP (Lightweight Identity Authentication Protocol) to reduce the handover authentication delay. LIAP employs a DSSP (Dynamic Session Secret Process) method to improve the speed and computational efficiency of the authentication process whilst simultaneously concealing the sensitive information of the vehicle. The security analysis results and performance evaluations show that LIAP not only provides an efficient and confidential authentication capability, but also preserves the robustness of the VANET toward malicious attacks.  相似文献   

12.
Radio-frequency identification (RFID) is a recent technology that utilizes radio frequencies to track the object by transmitting a signal with a unique serial identity. Generally, the drawbacks of RFID technology are high cost and authentication systems between a reader and a tag become weak. In this paper, we proposed a protocol for RFID tag–reader mutual authentication scheme which is hardware efficient and consumes less dynamic power. Truncated multipliers are implemented in RFID tag–reader mutual authentication protocol system due to reduction in hardware cost and dynamic power. Experimental evaluation reveals that the proposed protocol with truncated multipliers provides more security than the earlier schemes. The proposed protocol is described in VHDL and simulated using Altera Quartus II. The functional block is implemented as hardware using an Altera DE2 Cyclone II (EP2C35F672C6) Field-Programmable Gate Array (FPGA).  相似文献   

13.
Gilbert  H. Robshaw  M. Sibert  H. 《Electronics letters》2005,41(21):1169-1170
Much research has focused on providing RFID tags with lightweight cryptographic functionality. The HB/sup +/ authentication protocol was recently proposed and claimed to be secure against both passive and active attacks. A linear-time active attack against HB/sup +/ is proposed.  相似文献   

14.
15.
This article describes problems associated with remotely accessing networked appliances (e.g., from the Internet). Networked appliances are widely viewed as the “next wave” of devices on the Internet. We discuss some possible uses for networked appliances and the requirements for communicating with them. We present details of a solution to meet these communication requirements based on the IETF Session Initiation Protocol. In addition, we discuss the rationale for our approach and reasons other approaches were not adopted. An example of the use of the SIP in this domain is presented to illustrate how the solution can be used. We conclude with outstanding challenges and reiterate advantages of this approach  相似文献   

16.
《信息技术》2016,(8):175-179
目前解决网络层切换的大多数方法是基于移动IP技术的。但基于移动IP的三层切换技术,带来较大的时延和丢包率,不能满足实时性业务的需求。根据切换的基本过程,文中提出一种新的切换方法,在重关联时完成IP地址的分配实现三层切换,该方法同样适用于二层切换。性能分析结果表明,该切换方法具有较低的切换时延和丢包率。  相似文献   

17.
RFID systems allow contactless identification of objects using radio frequency. When there is more than one transponder within the interrogation area of a reader, all the transponders may send data (or tags) at the same time which may lead to mutual interference. This event causes data loss and is referred to as a collision. In this letter, we propose an enhanced binary search with cut-through operation to minimize the anti-collision cost. The analytic results show that the proposed scheme achieves low delay in the collision resolution with low power consumption.  相似文献   

18.
秦静  张振峰  冯登国  李宝 《通信学报》2004,25(11):35-42
摘要:安全多方计算是近几年国际密码学界研究的一个热点问题。基于Ф-隐藏假设及同态公钥加密体制的语义安全性假设,给出了一个特殊的安全双方计算协议——保密比较协议,该协议同时确保公平性、安全性、有效性和顽健性,并使用安全多方计算对安全性的严格定义,对协议的正确性与安全性进行了证明。与先前工作相比,本文的方案更富有公平性、有效性和安全性。该文在网上投标、拍卖、电子选举等领域中有着广阔的应用前景。  相似文献   

19.

Authentication has strong impact on the overall security model of every information system. Various authentication techniques are available for restricting the access of unauthorized users to the enterprise scale networks. IEEE 802.1X defines a secure and reliable authentication framework for 802.11 WLANs, where Extensible Authentication Protocol (EAP) provides the base to this architecture. EAP is a generic architectural framework which supports extensibility by incorporating the new and improved authentication schemes, which are based on different types of credentials. Currently there exist a number of EAP and Non-EAP methods with varying level of security and complexity. In this work, we have designed a new n-secret based authentication scheme referred here as Personal Dialogue Based Authentication, for the client authentication to the network. It is a Transport Layer Security (TLS) protected authentication protocol, which will be executed inside the secure TLS tunnel for providing the privacy and credential security to the wireless client. The developed authentication protocol has a reasonable set of features like; strong security, user privacy, simplicity and extensibility. For the formal analysis of the protocol we have used SPAN–AVISAP model checker on Ubuntu platform for validating the realization of the specified security goals. The experimental results obtained by simulation performed with the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool shows that our protocol is efficient and secured.

  相似文献   

20.
蔡昌曙  蔡昌许  刘昆  杨波 《信息技术》2007,31(11):96-98
针对目前信息传输的安全问题,给出了一种新型的基于PKI(Public Key Infrastructure)的信息安全传输协议模型,将椭圆曲线加密算法ECC,高级加密算法AES,MD5算法应用在其中,并给出了具体的实现过程,该协议主要解决了信息传输争接收过程中的身份认证、发送者和接收者的不可否认性、数据的完整性和保密性等问题。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号