共查询到19条相似文献,搜索用时 46 毫秒
1.
常志鹏 《计算机应用与软件》2021,38(5):344-349
对文献[11]协议进行安全性分析,给出一个改进的无后端数据库的认证协议.为抵抗攻击者暴力破解攻击,所有通信消息加密再传送,且加密过程中全部混入随机数;协议为减少系统整体的计算量,采用基于位运算实现的交叉再交换运算对信息加密,加密算法实现过程中根据加密信息自身汉明重量的不同进行相对应的操作.对协议进行安全性和性能分析,结... 相似文献
2.
王悦 《网络安全技术与应用》2020,(5):42-44
无线射频识别(Radio Frequency Identification,RFID)技术作为一种利用射频信号在物联网中实现自动识别的关键技术,已经被广泛应用于日常生活中销售,物流,医疗,交通,二代身份证等领域.但随之而来的,是RFID技术潜在的安全隐私问题.由于低成本的RFID标签计算能力和存储功能非常有限,所以现有... 相似文献
3.
4.
5.
6.
7.
8.
标签的成本限制着标签的物理性能,从而制约RFID系统安全性的实现,因此在低成本的环境下,解决授权访问和隐私保护成为RFID应用中的重要技术问题。文中在对现有的分布式RFID挑战-应答认证协议进行深入分析的基础上,针对“后台”式电子标签,提出了一种改进的低成本高效3步RFID认证协议—3WRAP,并使用形式化分析方法BAN逻辑对新提出的协议的正确性进行了推理证明。最后通过安全性和复杂度分析,表明文中所提出的协议具有安全、高效和成本低的特性。 相似文献
9.
针对Liang等人提出的基于双物理不可克隆函数(physical uncloneable function, PUF)的无线射频识别(radio frequency identification, RFID)认证协议进行分析发现其存在安全隐患,不能抵抗重放攻击、去同步攻击、标签伪造等恶意攻击.为解决由于恶意攻击者对RFID系统所造成的安全隐患问题,提出一种基于双PUF的RFID认证协议DPRAP.在伪随机数发生器种子生成阶段,不直接在非安全信道上传输种子的通信值,通过多次的Hash与异或运算对种子的值进行加密隐藏,保证协商种子的机密性;在标签与服务器的伪随机数发生器种子协商过程中,使用一个时间阈值,防止攻击者恶意阻塞通信信道引发去同步攻击,确保服务器与标签端的伪随机数发生器种子的同步性;在认证阶段,在认证信息中增加使用标签的身份标识IDS来对标签的合法性进行验证,防止标签假冒攻击.通过使用BAN逻辑和Vaudenay模型对DPRAP协议进行形式化分析和验证,证明DPRAP协议满足不可追踪性,能够抵抗去同步攻击、标签假冒攻击等攻击手段,结果表明DPRAP协议具有更强的安全隐私性和更好的实用性. 相似文献
10.
安全的RFID认证协议研究设计 总被引:3,自引:0,他引:3
分析了已有的各种RFID机制的安全应用和RFID系统保护个人隐私的机制,在此基础上提出并探讨了一个鲁棒性强、保护用户隐私、安全同步的认证协议,以满足计算能力不高、价格低廉的RFID系统.该认证协议满足了保护射频卡用户隐私的要求,并满足射频卡的不可跟踪性,不可克隆性等.提出的RFID系统使用无源标签,且其具有少量存储能力并具有可复写功能,在后继研究中给出了该协议的具体实现过程以及安全性证明. 相似文献
11.
针对目前提出的RFID协议存在认证安全问题以及较高时空复杂度,提出了一种采用高效NTRU加密的RFID三方认证通讯协议。建立对标签、阅读器和后台三方认证的通讯模型。结合实际存在的安全威胁,分析了所提出协议的安全性及性能。相比其他相关协议,在相互认证方面具有更高安全性和良好的性能表现。 相似文献
12.
Tzong-Chen Wu Author Vitae Thsia-Tzu Huang Author Vitae Author Vitae Kuo-Yu Tsai Author Vitae 《Journal of Systems and Software》2008,81(7):1227-1239
The authors propose a recursive protocol for group-oriented authentication with key exchange, in which a group of n entities can authenticate with each other and share a group session key. The proposed protocol has the following characteristics: First, it requires O(n) rounds of messages, O(log n) completion time, O(log n) waiting time, and O(n log n) communication overhead in average for the completion of the recursion. Second, it not only meets the five principles suggested by Diffie et al. [Diffie, W., van Oorschot, P.C., Wiener, M.J., 1992. Authentication and authenticated key exchange. Designs, Codes, and Cryptography 2 (2), 107-125] on the design of a secure key exchange protocol, but also achieves the properties of nondisclosure, independency, and integrity addressed by Janson and Tsudik [Janson, P., Tsudik, G., 1995. Secure and minimal protocols for authenticated key distribution. Computer Communications 18 (9), 645-653] for the authentication of the group session key. Third, we describe the beliefs of trustworthy entities involved in our authentication protocol and the evolution of these beliefs as a consequence of communication by using BAN logic. Finally, it is practical and efficient, because only one-way hash function and exclusive-or (XOR) operations are used in implementation. 相似文献
13.
M. MoessnerAuthor VitaeGul N. KhanAuthor Vitae 《Computer Networks》2012,56(1):273-286
Privacy and security concerns inhibit the fast adaption of RFID technology for many applications. A number of authentication protocols that address these concerns have been proposed but real-world solutions that are secure, maintain low communication cost and can be integrated into the ubiquitous EPCglobal Class 1 Generation 2 tag protocol (C1G2) are still needed and being investigated. We present a novel authentication protocol, which offers a high level of security through the combination of a random key scheme with a strong cryptography. The protocol is applicable to resource, power and computationally constraint platforms such as RFID tags. Our investigation shows that it can provide mutual authentication, untraceability, forward and backward security as well as resistance to replay, denial-ofth-service and man-in-the-middle attacks, while retaining a competitive communication cost. The protocol has been integrated into the EPCglobal C1G2 tag protocol, which assures low implementation cost. We also present a successful implementation of our protocol on real-world components such as the INTEL WISP UHF RFID tag and a C1G2 compliant reader. 相似文献
14.
当前射频识别技术己被广泛应用于工业自动化、商业自动化、交通运输控制管理、防伪等领域,其安全性越来越得到重视。介绍了其安全机制和在防伪方面的应用,并探讨了RFID协议的安全性分析和证明方法。 相似文献
15.
当前射频识别技术己被广泛应用于工业自动化、商业自动化、交通运输控制管理、防伪等领域,其安全性越来越得到重视。介绍了其安全机制和在防伪方面的应用,并探讨了RFID协议的安全性分析和证明方法。 相似文献
16.
Gaurav Kapoor Selwyn Piramuthu 《Engineering Applications of Artificial Intelligence》2011,24(7):1300-1302
As incorporation of RFID (Radio Frequency IDentification) tags in a wide variety of applications increase, there is a need to ensure the security and privacy of the entity to which these tags are attached. Not surprisingly, this is a very active area as attested by the large number of related published research literature. Recently, the journal engineering applications of artificial intelligence published a paper by Chen and Deng (2009) where the authors propose a mutual authentication protocol for RFID. This protocol has fundamental flaws that can be readily taken advantage by a resourceful adversary. We identify and discuss these vulnerabilities and point out the characteristics of this protocol that exposes it to these vulnerabilities. 相似文献
17.
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value 总被引:4,自引:0,他引:4
Radio Frequency IDentification (RFID ) system is a contactless automatic identification system using small, low-cost RFID tags. It enables recognition of the tag information via radio frequency communication, by attaching an RFID tag to an animate or inanimate object. Since an RFID system has the advantage of simultaneously recognizing massive amounts of information, it is expected to replace the bar-code system. The most important problem with an RFID system is that an adversary can access the tag information, which gives rise to privacy and forgery problems. This paper presents a hash-based mutual authentication protocol as a solution. The proposed protocol is designed to send a random number generated by a tag to a back-end server without disclosure. Moreover it substitutes a random number with a secret value, which is employed in a response message. The properties of the proposed protocol enable constant creation of distinct response messages without interferences from intended or meaningless requests generated by an adversary, while the secret value is not directly transmitted. Our proposed protocol make is difficult for an attacker to launch successful brute-force attacks against our approach. 相似文献
18.
随着射频识别(RFID)技术的发展和广泛应用,RFID系统的安全性成为了研究的热点,但是由于标签有限的计算能力和存储能力,安全协议的设计成为了保证RFID系统安全的关键。文章对SYK协议的安全性进行了分析,针对其存在的多个安全漏洞进行改进,提出了一种改进型的RFID相互认证协议。安全性能分析表明,改进后的协议通过标签和数据库的信息同步更新和散列函数加密,解决了SYK协议的安全隐私问题,满足基本的安全性能,可以抵制跟踪、去同步、重传等多种攻击,提高了RFID系统的安全性。 相似文献
19.
文章基于通用可组合安全模型,设计了一个RFID双向认证协议,该协议实现了前向和后向不可追踪性,能抵御RFID系统中常见的弱攻击或者强攻击,并且基于通用可组合安全模型证明了该协议在任意未知环境中也不会降低其安全性。 相似文献