高级检索
    李涛, 刘亚丽. 一种基于双PUF的RFID认证协议[J]. 计算机研究与发展, 2021, 58(8): 1801-1810. DOI: 10.7544/issn1000-1239.2021.20200477
    引用本文: 李涛, 刘亚丽. 一种基于双PUF的RFID认证协议[J]. 计算机研究与发展, 2021, 58(8): 1801-1810. DOI: 10.7544/issn1000-1239.2021.20200477
    Li Tao, Liu Yali. A Double PUF-Based RFID Authentication Protocol[J]. Journal of Computer Research and Development, 2021, 58(8): 1801-1810. DOI: 10.7544/issn1000-1239.2021.20200477
    Citation: Li Tao, Liu Yali. A Double PUF-Based RFID Authentication Protocol[J]. Journal of Computer Research and Development, 2021, 58(8): 1801-1810. DOI: 10.7544/issn1000-1239.2021.20200477

    一种基于双PUF的RFID认证协议

    A Double PUF-Based RFID Authentication Protocol

    • 摘要: 针对Liang等人提出的基于双物理不可克隆函数(physical uncloneable function, PUF)的无线射频识别(radio frequency identification, RFID)认证协议进行分析发现其存在安全隐患,不能抵抗重放攻击、去同步攻击、标签伪造等恶意攻击.为解决由于恶意攻击者对RFID系统所造成的安全隐患问题,提出一种基于双PUF的RFID认证协议DPRAP.在伪随机数发生器种子生成阶段,不直接在非安全信道上传输种子的通信值,通过多次的Hash与异或运算对种子的值进行加密隐藏,保证协商种子的机密性;在标签与服务器的伪随机数发生器种子协商过程中,使用一个时间阈值,防止攻击者恶意阻塞通信信道引发去同步攻击,确保服务器与标签端的伪随机数发生器种子的同步性;在认证阶段,在认证信息中增加使用标签的身份标识IDS来对标签的合法性进行验证,防止标签假冒攻击.通过使用BAN逻辑和Vaudenay模型对DPRAP协议进行形式化分析和验证,证明DPRAP协议满足不可追踪性,能够抵抗去同步攻击、标签假冒攻击等攻击手段,结果表明DPRAP协议具有更强的安全隐私性和更好的实用性.

       

      Abstract: This paper focuses on analyzing the double PUF-based RFID authentication protocol proposed by Liang et al. and security risks are found in the protocol. The protocol cannot resist replay attack, desynchronization attack, tag impersonation and other malicious attacks. In order to solve the security problems caused by malicious attackers to RFID system, a double PUF-based RFID authentication protocol(DPRAP) is proposed in this paper. In the pseudo-random number generator seed generation phase, the communication value of the seed is not transmitted directly on the insecure channel, and the value of the seed is encrypted and hidden through multiple hashing and xor operations to ensure the confidentiality of the negotiated seed. In the process of pseudo-random number generator seed negotiation between the tag and the server, a time threshold is used to prevent the attacker from blocking the communication channel and causing desynchronization attack, so as to ensure the synchronization of the seed of the pseudo-random number generator between the server and the tag. In the authentication phase, IDS is added to the authentication information to verify the validity of the tag and prevent the tag impersonation attack. By using BAN logic and Vaudenay model to formally analyze and verify the proposed DPRAP protocol, it is proved that DPRAP protocol meets the untraceability and can resist the attacks such as desynsynchronization attack and tag impersonation attack. The results show that the DPRAP protocol has stronger security and privacy and better practicability.

       

    /

    返回文章
    返回