共查询到20条相似文献,搜索用时 828 毫秒
1.
针对目前无线射频识别(RFID)技术在安全性方面存在的问题,采用散列函数和共享密钥设计了RFID安全协议。分析了RFID在实际应用中存在的安全和隐私问题,提出了一种基于数论研究单元(NTRU)公钥密码系统和Hash函数的RFID认证协议。该协议利用NTRU公钥密码系统产生系统的共享公钥,并运用Hash函数对共享公钥进行Hash运算,保证了RFID系统信息安全性。理论分析表明,该协议能有效地防止消息泄漏、伪装、定位跟踪等安全攻击。 相似文献
2.
3.
安全有效的认证协议是对RFID系统安全的有力保障,适宜的形式化分析方法能为RFID认证协议提供有效的证明。设计了基于伪ID的RFID认证协议,伪ID由标签ID、标签认证数值和随机数产生。标签ID不出现在协议执行过程中,减少了系统遭受攻击的可能性。协议通过标签ID、标签认证值和随机数的Hash运算实现认证。利用串空间模型对协议进行形式化分析,建立认证协议的串空间模型丛图,证明了协议的保密性和匿名性。通过分析常规的基于Hash函数的认证协议的性能可知,该协议在使用较低运算成本的情况下可以抵抗多种攻击,并能够完成标签和读写器之间的双向认证。 相似文献
4.
随着RFID系统应用的不断扩大,RFID的安全问题也越来越受到人们的关注。基于Hash函数的RFID安全协议以其低成本的优势得到了广泛的应用,但其安全性能尚不完善。文章在分析已有的HashLock安全协议的基础上,提出了3种基于Hash函数的RFID安全认证协议IHSAP、IHSAP2和IHSAP3。通过对其进行安全性分析和性能评价可知,IHSAP3性能最好,它可以很好地解决了RFID系统中的信息泄露、位置跟踪、假冒攻击、重放攻击等安全与隐私问题。 相似文献
5.
基于Hash函数的RFID安全认证协议研究 总被引:18,自引:2,他引:16
无线传输、信号广播、资源受限等特点使RFID技术存在潜在安全隐患.在对RFID技术所面临的安全问题进行了详细地描述和分析后,提出了认证识别的单一会话模式和连续会话模式的概念,基于Hash函数设计了一个介于RFID标签和后端服务器之间的安全认证协议HSAP,以解决假冒攻击、重传攻击、追踪、去同步化等安全问题,并基于GNY逻辑给出了形式化的证明.由于在RFID标签中仅仅使用了Hash函数和或操作,因此HSAP协议跟先前的工作相比更适合于低成本RFID系统. 相似文献
6.
7.
8.
9.
在当前已有基于Hash函数增强RFID安全性的方法基础上,利用基于挑战-响应方式互相认证协议最小形式,针对已有的Key值更新随机Hash锁泄漏位置隐私的安全威胁,提出了一种改进的RFID互相认证方法。该方法弥补了已有研究的不足,对标签的响应增加了随机性,可以更好地应对位置隐私泄漏的威胁。 相似文献
10.
为解决RFID技术在用户隐私方面存在的安全隐患,提出了一种基于Niederreiter密码体制的新型RFID双向安全认证协议。协议建立在大矩阵分解困难性的基础上,与使用对称密码和RSA公钥密码的协议相比安全性能更高、计算复杂度更小、实现效率更高。该协议利用基于嵌入Hash函数的Niederreiter公钥加密方案,通过对比原Hash值与解密后的Hash值是否相等,来实现RFID标签与阅读器之间的安全数据交换。研究结果表明,该协议不仅能有效地保护内容隐私、位置隐私,而且还能防范重放攻击,能够很好地满足RFID系统的安全性要求。 相似文献
11.
RFID系统中基于公钥加密的相互认证协议 总被引:1,自引:0,他引:1
随着RFID系统能力的提高和标签应用的日益普及,安全问题,特别是用户隐私问题变得日益严重。提出了一种新的RFID认证协议。认为基于公钥加密的RFID认证协议相对基于哈希函数和基于对称密钥加密的RFID认证协议,有较好的安全性。公钥加密算法NTRU被认为是一种效率较高的加密算法,且更适合于RFID系统,因此提出的协议采用了NTRU公钥加密算法。对该协议的安全性和性能进行了比较分析,结果表明该协议可以为RFID系统提供更好的安全性,能为用户提供更好的隐私保护,且性能较佳。 相似文献
12.
13.
14.
Radio frequency identification (RFID) technology has been widely used in ubiquitous infrastructures. However, resource constraint
in the low-cost RFID systems has posed potential risks such as privacy and security problems, becoming adoption barrier for
RFID-based applications. In this paper, current security issues in RFID are introduced firstly. Then, we propose a lightweight
Anti-desynchronization privacy preserving RFID authentication protocol. It is particularly suitable for the low-cost RFID
environment for only the capacity of one-way hash function and XOR operation is needed. In this lightweight Anti-desynchronization
RFID authentication protocol, the back-end server keeps the history of the random key update to prevent the active attackers
from de-synchronizing the shared secret between the tag and the back-end server. The security and the performance of the proposed
protocol are analyzed as well. 相似文献
15.
16.
The use of radio frequency identification (RFID) tags may cause privacy violation of users carrying an RFID tag. Due to the unique identification number of the RFID tag, the possible privacy threats are information leakage of a tag, traceability of the consumer, denial of service attack, replay attack and impersonation of a tag, etc. There are a number of challenges in providing privacy and security in the RFID tag due to the limited computation, storage and communication ability of low-cost RFID tags. Many research works have already been conducted using hash functions and pseudorandom numbers. As the same random number can recur many times, the adversary can use the response derived from the same random number for replay attack and it can cause a break in location privacy. This paper proposes an RFID authentication protocol using a static identifier, a monotonically increasing timestamp, a tag side random number and a hash function to protect the RFID system from adversary attacks. The proposed protocol also indicates that it requires less storage and computation than previous existing RFID authentication protocols but offers a larger range of security protection. A simulation is also conducted to verify some of the privacy and security properties of the proposed protocol. 相似文献
17.
18.
Radio frequency identification (RFID) system is a contactless automatic identification system, which uses small and low cost RFID tags. The primary problem of current security and privacy preserving schemes is that, in order to identify only one single tag, these schemes require a linear computational complexity on the server side. We propose an efficient mutual authentication protocol for passive RFID tags that provides confidentiality, untraceability, mutual authentication, and efficiency. The proposed protocol shifts the heavy burden of asymmetric encryption and decryption operations on the more powerful server side and only leaves lightweight hash operation on tag side. It is also efficient in terms of time complexity, space complexity, and communication cost, which are very important for practical large-scale RFID applications. 相似文献
19.
Radio frequency identification (RFID) is a promising wireless sensor technology in the Internet of Things and can be applied for object identification. However, the security issues are still open challenges and should be addressed to achieve enhanced safeguard. Existing security solutions mainly apply logical operators, hash function, and other cryptographic primitives to design authentication schemes. In this paper, we propose a Chebyshev chaotic map-based authentication protocol (C2MP) for the RFID applications. Thereinto, Chebyshev polynomial’s semigroup and chaotic properties are introduced for identity authentication and anonymous data transmission. The proposed C2MP owns the security properties including data integrity, authentication, anonymity, and session freshness. According to the BAN logic, security formal analysis is performed based on the messages formalization, initial assumptions, anticipant goals, and logic verification. It indicates that the proposed C2MP is suitable for universal RFID applications. 相似文献
20.
基于批量处理的特性,提出一个适用于供应链的可扩展的读写器-标签双向认证协议.在该协议中,后端数据库识别一个标签只需运行3次哈希函数和O(logn)次比较大小的运算,标签的计算量和已有的不可扩展的协议相当.提出的协议显著提高了射频识别RFID(Radio Frequency Identification)供应链管理系统的效率,并且满足其安全需求. 相似文献