共查询到17条相似文献,搜索用时 435 毫秒
1.
2.
针对移动RFID系统认证中可能出现的成本、效率、安全问题,设计了一种基于单向伪随机函数的移动RFID认证协议.协议在满足Gen-2标准的前提下,综合采用位替换运算、异或运算和单向伪随机函数加密通信信息;协议充分利用标签、读写器、后端数据库三方共享密钥和三方通信信息,对信息进行加密传输和加密认证,降低系统成本;通过实现完整三方认证与密钥更新工作,避免协议遭受假冒、去同步化等攻击行为.最后,给出协议GNY理论逻辑证明以及安全、性能分析,表明新协议的可行性与安全性. 相似文献
3.
4.
5.
6.
RFID系统中有限的标签芯片资源,导致数据与信息的安全成为RFID系统的重要问题之一,散列函数的单向性为RFID的识别和认证提供了一种既可靠又有效的途径.在分析了现有几种典型散列认证协议的基础上,提出了一种新的基于散列函数的安全认证协议.本协议旨在解决手持式、无线连接的RFID阅读器与标签、服务器间的识别,利用散列函数实现服务器、阅读器以及电子标签三者之间的相互认证.经过安全性与性能的分析,新协议在采用较小的存储空间和较低的运算开销的情况下,可抵抗已知的大多数攻击,有效地保证了RFID系统中数据和隐私的安全,实现了终端与服务器间的双向认证和匿名认证,非常适合于在大型分布式系统中使用. 相似文献
7.
系统中信息的安全性是制约射频识别技术(RFID)广泛应用的一个重要因素.基于Hash函数的RFID认证协议是受到广泛关注的解决方案.本文针对RFID系统存在的用户安全及隐私等问题,在讨论了现有协议的优缺点的基础上,提出了一种基于Hash链的双向认证方案.分析表明,该协议具有不可分辨性、前向安全性、抗重放攻击、哄骗攻击等特点. 相似文献
8.
9.
10.
针对RFID技术的安全与隐私保护问题及RFID标签资源的有限性问题,本文提出了一种基于口令认证可证安全的RFID通信安全协议--pRPAP.为求从根本上解决RFID技术的安全与隐私保护问题,本文提出为RFID系统建立通信安全模型.从形式化论证的角度出发,基于随机预言模型,使用形式化描述方式,系统地建立了RFID通信安全型.该模型包括RFID系统模型,RFID系统的攻击模型以及RFID通信安全协议的安全目标模型.并在该模型下,证明了pRPAP的安全性.证明结果显示本文提出的基于口令认证可证安全的RFID通信安全协议能够有效地解决RFID技术的安全问题.此外,本文所建立的RFID通信安全模型还有助于指导pRPAP协议各项参数的选择,以便建立适合不同安全等级要求的RFID通信安全协议.RFID通信安全模型的建立,也有助于对RFID通信安全协议进一步深入地研究. 相似文献
11.
随着RFID技术的不断发展,RFID的安全问题得到了更多的关注。流密码算法相对其他加密体制,具有简洁、有效、适用于硬件实现等特点。文中从流密码角度,选取了一种资源开销相对较少、硬件实现比较方便的流密码算法-Grainv1,并结合现有的RFID安全认证协议,提出部分改进和优化,使协议本身除了基本的抗攻击性以外更加简洁、有效。同时,通过软件平台的仿真了解数据在协议认证过程中的变化情况和运行效率。 相似文献
12.
Md. Endadul Hoque Farzana Rahman Sheikh I. Ahamed Jong Hyuk Park 《Wireless Personal Communications》2010,55(1):65-79
One of the recent realms that gathered attention of researchers is the security issues of Radio Frequency Identification (RFID)
systems that have tradeoff between controlled costs and improved efficiency. Evolvement and benefits of RFID technology signifies
that it can be low-cost, efficient and secured solution to many pervasive applications. But RFID technology will not intermingle
into human lives until prevailing and flexible privacy mechanisms are conceived. However, ensuring strong privacy has been
an enormous challenge due to extremely inadequate computational storage of typical RFID tags. So in order to relieve tags
from responsibility, privacy protection and security assurance was guaranteed by central server. In this paper, we suggest
serverless, forward secure and untraceable authentication protocol for RFID tags. This authentication protocol safeguards
both tag and reader against almost all major attacks without the intervention of server. Though it is very critical to guarantee
untraceability and scalability simultaneously, here we are proposing a scheme to make our protocol more scalable via ownership
transfer. To the best of our knowledge this feature is incorporated in the serverless system for the first time in pervasive
environments. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far.
But we firmly believe that in near future tag searching will be a significant issue RFID based pervasive systems. So in this
paper we propose a serverless RFID tag searching protocol in pervasive environments. This protocol can search a particular
tag efficiently without server’s intervention. Furthermore they are secured against major security threats. 相似文献
13.
Radio-frequency identification (RFID) is a recent technology that utilizes radio frequencies to track the object by transmitting a signal with a unique serial identity. Generally, the drawbacks of RFID technology are high cost and authentication systems between a reader and a tag become weak. In this paper, we proposed a protocol for RFID tag–reader mutual authentication scheme which is hardware efficient and consumes less dynamic power. Truncated multipliers are implemented in RFID tag–reader mutual authentication protocol system due to reduction in hardware cost and dynamic power. Experimental evaluation reveals that the proposed protocol with truncated multipliers provides more security than the earlier schemes. The proposed protocol is described in VHDL and simulated using Altera Quartus II. The functional block is implemented as hardware using an Altera DE2 Cyclone II (EP2C35F672C6) Field-Programmable Gate Array (FPGA). 相似文献
14.
一种RFID标签信息安全传输协议 总被引:3,自引:0,他引:3
针对在射频识别(RFID)标签资源受限条件下的标签信息安全传输与隐私保护问题,提出了一种能够实现对RFID标签信息安全传输的协议,该协议能够实现后端数据管理系统对读写器和标签的认证,以及实现密钥的分发,实现标签数据的安全传输。然后采用形式化分析的方法,对该协议进行了分析,分析了其具有的安全属性、抗攻击属性以及其他属性。最后对该协议与传统基于Hash机制的多种协议进行了分析比较,分析结果认为,该协议具有比传统基于Hash机制的协议具有更多的安全属性和抗攻击属性,同时具有适度的运算量,能够满足现有很多场合的应用条件。 相似文献
15.
16.
一种基于部分ID的新型RFID安全隐私相互认证协议 总被引:2,自引:0,他引:2
在低成本电子标签中实现安全隐私功能是RFID研究领域需要解决的一项关键技术,该文采用部分ID,CRC校验以及ID动态更新的方法,提出一种新型RFID相互认证协议,该协议具有前向安全性,能够防止位置隐私攻击、重传攻击、窃听攻击和拒绝服务攻击,新协议有效地解决了RFID安全隐私问题,并且符合EPC Class1 Gen2标准,它的硬件复杂度较低,适用于低成本电子标签. 相似文献
17.
Jing Huey Khor Widad Ismail Mohammed I. Younis M. K. Sulaiman Mohammad Ghulam Rahman 《Wireless Personal Communications》2011,59(1):17-26
This paper focuses on the security and privacy threats being faced by the low-cost RFID communication system, the most challenging
of which relate to eavesdropping, impersonation, and tag cloning problems. The security issues can be improved and solved
by utilizing both prevention and detection strategies. Prevention technique is needed since it offers resistance capabilities
toward eavesdroppers and impersonators. Detection technique is vital to minimize the negative effects of tag cloning threats.
This paper proposes the use of both prevention and detection techniques to make RFID communication more secure. Lightweight
cryptographic algorithm, which conforms to the EPC Class-1 Generation-2 standard, is used in the proposed mutual authentication
protocol for RFID system to raise security levels. In addition, electronic fingerprinting system is deployed in the proposed
solution as a detection method to distinguish counterfeit and legitimate tags. 相似文献