首页 | 本学科首页   官方微博 | 高级检索  
     

增强型RFID极低限相互认证协议
引用本文:张学军,蔡文琦,王玉.增强型RFID极低限相互认证协议[J].计算机应用,2012,32(9):2395-2399.
作者姓名:张学军  蔡文琦  王玉
作者单位:南京邮电大学 电子科学与工程学院,南京 210003
基金项目:国家自然科学基金资助项目(61001077,61076073);江苏省高校自然科学基金资助项目(08KJB510015);华为高校科技基金资助项目(YJCB2008039WL)
摘    要:针对极低限相互认证协议(M2AP)不能够抵御中间人攻击的缺点,通过对传输的信息进行一定的保护,提出了增强型极低限相互认证协议(EM2AP)。该协议通过计算标签和阅读器共享密钥的汉明权重,并根据这个值对传输的信息进行循环移位,从而有效地抵御了中间人攻击。通过BAN逻辑证明、安全分析和性能分析,表明该协议能够在维持标签低成本的同时具有较高的安全性和可靠性。

关 键 词:射频识别    相互认证协议    循环移位    BAN逻辑    极低限相互认证协议
收稿时间:2012-03-19
修稿时间:2012-05-02

Enhanced minimalist mutual-authentication protocol for RFID system
ZHANG Xue-jun,CAI Wen-qi,WANG Yu.Enhanced minimalist mutual-authentication protocol for RFID system[J].journal of Computer Applications,2012,32(9):2395-2399.
Authors:ZHANG Xue-jun  CAI Wen-qi  WANG Yu
Affiliation:School of Electronic Science and Engineering,Nanjing University of Posts and Telecommunications,Nanjing Jiangsu 210003,China
Abstract:Concerning the disadvantage of the Minimalist Mutual-Authentication Protocol(M2AP) that it cannot resist the man-in-the-middle attacks,an Enhanced M2AP(EM2AP) was presented by protecting the messages transmitted between reader and tag.The protocol calculated the Hamming weight of the shared key of tag and reader and then used the weight value to protect the transmitted message on the cyclic shift,thus effectively avoiding the man-in-the-middle attacks.By BAN logic,security analysis and performance analysis,this paper shows that this protocol cannot only maintain the low cost of tags,but also ensure good security and reliability.
Keywords:Radio Frequency IDentification(RFID)  mutual-authentication protocol  cyclic shift  logic of Burrows  Abadi and Needham(BAN logic)  Minimalist Mutual-Authentication Protocol(M2AP)
本文献已被 CNKI 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号