高级检索
    金永明, 吴棋滢, 石志强, 芦 翔, 孙利民. 基于PRF的RFID轻量级认证协议研究[J]. 计算机研究与发展, 2014, 51(7): 1506-1514.
    引用本文: 金永明, 吴棋滢, 石志强, 芦 翔, 孙利民. 基于PRF的RFID轻量级认证协议研究[J]. 计算机研究与发展, 2014, 51(7): 1506-1514.
    Jin Yongming, Wu Qiying, Shi Zhiqiang, Lu Xiang, Sun Limin. RFID Lightweight Authentication Protocol Based on PRF[J]. Journal of Computer Research and Development, 2014, 51(7): 1506-1514.
    Citation: Jin Yongming, Wu Qiying, Shi Zhiqiang, Lu Xiang, Sun Limin. RFID Lightweight Authentication Protocol Based on PRF[J]. Journal of Computer Research and Development, 2014, 51(7): 1506-1514.

    基于PRF的RFID轻量级认证协议研究

    RFID Lightweight Authentication Protocol Based on PRF

    • 摘要: 无线射频识别(radio frequency identification, RFID)认证协议可实现读写器和标签之间的身份识别,保证只有合法的读写器才能访问标签的数据.由于标签的成本限制,设计最轻量级的RFID认证协议是面临的主要挑战.为了达到不可预测性隐私,标签至少需要具有伪随机函数PRF的能力.首先提出了一种基于PRF的RFID轻量级认证协议的基本框架,给出了抽象描述.基于对消息认证函数F\-i的实例化,提出了一种新的RFID轻量级认证协议ELAP.与现有协议相比,该协议可以实现读写器和标签之间的双向认证,并能抵抗已知的所有攻击方式.在效率方面,标签只需要进行2次消息摘要运算,让标签的计算代价达到了最小.

       

      Abstract: Radio frequency identification (RFID) is a wireless automatic identification and data capture technology that uses radio signals to identify a product, animal or person without the need for physical access or line of sight. The wide deployment of RFID systems in a variety of applications has raised many concerns about the security and privacy. RFID authentication protocol can implement the identification between the reader and the tag, and ensure only legitimate reader to access the tag’s data. Because of cost constraints of the tag, the design of lightweight RFID authentication protocol is the main challenge. In order to achieve the unpredictability of privacy, the tag requires at least having the ability of pseudorandom function (PRF). In this paper, a framework of RFID lightweight authentication protocol based on PRF is described abstractly. Based on the implementation of message authentication function F\-i, a new RFID lightweight authentication protocol, ELAP, is proposed. Compared with the existing protocol, the new protocol can achieve mutual authentication between reader and tag, and resistant to all known attacks. In the efficiency, the tag need only two-time message digest computing, thus the computational cost of the tag is the minimum.

       

    /

    返回文章
    返回