首页 | 本学科首页   官方微博 | 高级检索  
     

结合Hash函数和密钥阵列的RFID安全认证协议
引用本文:谢川. 结合Hash函数和密钥阵列的RFID安全认证协议[J]. 计算机应用, 2011, 31(3): 805-807. DOI: 10.3724/SP.J.1087.2011.00805
作者姓名:谢川
作者单位:重庆工商大学 计算机科学与信息工程学院,重庆400067
摘    要:无线传输、信号广播、资源受限等特点使无线射频识别(RFID)技术存在潜在的安全隐患。在分析目前常见的RFID认证协议基础上,提出一种结合单向Hash函数和密钥阵列的安全认证协议。新协议在认证过程中使用单向Hash函数值代替标签标识符ID,并为每一对阅读器和标签之间设计独立的认证密钥,在抵抗包括窃听、位置跟踪、重传攻击、拒绝服务和篡改等多种攻击的基础上,进一步增强了标签信息的私密性,对抵御来自系统内部的威胁具有明显的优势。

关 键 词:无线射频识别  标签  阅读器  后台服务器  认证协议  哈希函数
收稿时间:2010-08-18
修稿时间:2010-10-09

RFID authentication protocol based on Hash function and key array
XIE Chuan. RFID authentication protocol based on Hash function and key array[J]. Journal of Computer Applications, 2011, 31(3): 805-807. DOI: 10.3724/SP.J.1087.2011.00805
Authors:XIE Chuan
Affiliation:College of Computer Science and Information Engineering, Chongqing Technology and Business University, Chongqing 400067, China
Abstract:Wireless transmission, broadcast of signals, resource-constraint disturb the reliability of Radio Frequency Identification (RFID) system and block the deployment progress of RFID techniques. Through the analysis of current common RFID authentication protocol, an authentication protocol based on Hash function and key array was proposed. The new protocol used one-way Hash function value instead of label identifier, and designed independent authentication key for each pair between the reader and the tag in the certification process. It could resist several possible attacks, including eavesdropping, location tracking, re-transmission attacks, Denial of Service (DoS), tampering and other attacks. It has obvious advantages in enhancing the tag identity privacy, and resisting the threat from within the system.
Keywords:
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号