高级检索
    丁振华, 李锦涛, 冯 波. 基于Hash函数的RFID安全认证协议研究[J]. 计算机研究与发展, 2009, 46(4): 583-592.
    引用本文: 丁振华, 李锦涛, 冯 波. 基于Hash函数的RFID安全认证协议研究[J]. 计算机研究与发展, 2009, 46(4): 583-592.
    Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.
    Citation: Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.

    基于Hash函数的RFID安全认证协议研究

    Research on Hash-Based RFID Security Authentication Protocol

    • 摘要: 无线传输、信号广播、资源受限等特点使RFID技术存在潜在安全隐患.在对RFID技术所面临的安全问题进行了详细地描述和分析后,提出了认证识别的单一会话模式和连续会话模式的概念,基于Hash函数设计了一个介于RFID标签和后端服务器之间的安全认证协议HSAP,以解决假冒攻击、重传攻击、追踪、去同步化等安全问题,并基于GNY逻辑给出了形式化的证明.由于在RFID标签中仅仅使用了Hash函数和或操作,因此HSAP协议跟先前的工作相比更适合于低成本RFID系统.

       

      Abstract: Radio frequency identification (RFID) is a technique using radio frequency for object identification. It is regarded as one of the ten most important technologies of this century due to its celerity, real-time, veracity in collecting and processing information through unique identification. RFID can be widely used in manufacture, retail, logistics, transportation, medical treatment, national defence, etc. However, wireless transmission, broadcast of signals, resource-constraint, etc. bring some potential risks, which disturb the reliability of RFID system and block the deployment progress of RFID techniques. To prevent the security threats, based on the analysis of the security problem, two concepts of operation mode, the single session mode and the successive session mode, are proposed; and a Hash-based Security Authentication Protocol (HSAP) between tags and the back-end server for low-cost RFID system is designed. This protocol can prevent many security problems including spoofing attack, replay attack, tracking, as well as the problem of desynchronization. The formal proof of correctness of the proposed authentication protocol is given based on GNY logic. As only hash function and bitwise OR operation are required to be computed by tags, so the proposed strategy is very suitable for low-cost RFID system compared with previous works.

       

    /

    返回文章
    返回