基于云的轻量级RFID群组标签认证协议
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Cloud-based Lightweight RFID Group Tag Authentication Protocol
  • 作者:李璐璐 ; 董庆宽 ; 陈萌萌
  • 英文作者:LI Lu-lu;DONG Qing-kuan;CHEN Meng-meng;State Key Laboratory of Integrated Service Networks,Xidian University;
  • 关键词:云数据库 ; RFID ; 轻量级认证协议 ; 群组认证 ; BAN逻辑
  • 英文关键词:Cloud database;;RFID;;Lightweight authentication protocol;;Group authentication;;BAN logic
  • 中文刊名:JSJA
  • 英文刊名:Computer Science
  • 机构:西安电子科技大学综合业务网国家重点实验室;
  • 出版日期:2019-01-15
  • 出版单位:计算机科学
  • 年:2019
  • 期:v.46
  • 基金:国家自然科学基金项目(61373172)资助
  • 语种:中文;
  • 页:JSJA201901029
  • 页数:8
  • CN:01
  • ISSN:50-1075/TP
  • 分类号:189-196
摘要
射频识别技术(Radio Frequency Identification,RFID)作为物联网中标识物品的关键技术,其因低成本、易携带等优势而得到了广泛的应用。基于云存储的RFID技术相较于传统RFID技术更具有应用市场,但其安全隐私问题也更为严重。另外,现有的很多群组标签认证协议不仅不符合轻量级要求,还具有密钥失同步的问题。文中提出一种基于云的轻量级RFID群组标签认证协议。该协议基于Hash函数而设计,它不仅解决了上述安全隐患,还能在群组认证过程中筛除无效标签和假冒标签。最后,利用BAN逻辑对该协议进行了分析。安全目标分析表明,该协议可以抗多重DOS攻击以及其他基本攻击,并满足前向安全性。
        As a key technology for indentifying objects in the Internet of Things(IoT),radio frequency identification(RFID)technology has been widely used because of its advantages,such as low cost and easy to carry.The RFID system based on cloud storage technology has a more widely application market comparing with the traditional RFID system,but its security and privacy issues are more serious.At the same time,many existing group authentication protocols don't meet the lightweight requirements,and have the lost synchronization problem in key updating process.This paper proposed a cloud-based lightweight RFID tag group authentication protocol.This protocol is based on the Hash function,which not only resolves these issues above,but also filters out the invalid and fake labels.Finally,this paper conducted the formal analysis of the proposed protocol by using BAN logic.The security target analysis shows that the proposed protocol can resist the multi-DOS attack and other common attacks,and possesses the forward security.
引文
[1]ZHANG D Q,QIAN Y M,WAN J F,et al.An Efficient RFIDSearch Protocol Based on Clouds[J].Mobile Networks&Applications,2015,20(3):356-362.
    [2]WEIS S.Security and Privacy in Radio-frequency Identification Devices[D].Boston:Massachusetts Institute of Technology,2003.
    [3]TSUDIK G.YA-TRAP:yet another trivial RFID authentication protocol[C]∥IEEE International Conference on Pervasive Computing and Communications Workshops.Italy,IEEE Computer Society,2006:640-643.
    [4]RHEE K,JIN K,KIM S,et al.Challenge-Response Based RFIDAuthentication Protocol for Distributed Database Environment[J].Kips Transactions Partc,2005,3450(3):309-316.
    [5]YAN F,LIU B W,HUO L Y,et al.Research and Design of a Security Framework for RFID System[C]∥International Forum on Information Technology and Applications.Beijing,IEEEComputer Society,2010:443-445.
    [6]XIAO H,ALSHEHRI A,CHRISTIANSON B.A Cloud-Based RFID Authentication Protocol with Insecure Communication Channels[C]∥IEEE Trustcom/BigDatase/ISPA.IEEE,2017:332-339.
    [7]DA L M.Research on Information Security Technology of the Internet of Things at the Perceived Layers of RFID and WSN[J].Journal of Nanjing Institute of Industry Technology,2014(1):8-11.(in Chinese)笪林梅.物联网感知层RFID和WSN信息安全技术研究[J].南京:工业技术学院学报,2014(1):8-11.
    [8]LEE C F,CHIEN H Y,LAIH C S.Server-less RFID authentication and searching protocol with enhanced security[J].International Journal of Communication Systems,2012,25(3):376-385.
    [9]HOQUE M E,RAHMAN F,AHAMED S I,et al.Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments[J].Wireless Personal Communications,2010,55(1):65-79.
    [10]ZHAN Y,SUN Y.Cloud Storage Management Technology[C]∥International Conference on Information and Computing Science.2009:309-311.
    [11]BELLARE M,RAN C,KRAWCZYK H.H·:Keying Hash Functions for Message Authentication[M]∥Advances in Cryptology---CRYPTO’96.Springer Berlin Heidelberg,1991.
    [12]GUO J,PEYRIN T,POSCHMANN A.The PHOTON Family of Lightweight Hash Functions[OL].http://www.reshaem.net/tasks/task_152522.pdf.
    [13]WEI X,LEI X,CHEN Z.Cloud-based RFID Authentication[C]∥IEEE International Conference on RFID.2013:168-175.
    [14]DONG Q K,TONG J Q,CHEN Y.Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud[C]∥International Journal of Distributed Sensor Networks.2015:1-9.
    [15]ZHENG J B.RFID mutual authentication protocol based on Cloud Server[J].Journal of Mudanjiang University,2016,25(7):152-154.(in China)郑金彬.基于云服务器的RFID双向认证协议[J].牡丹江大学学报,2016,25(7):152-154.
    [16]KARDAS S,CELIK S,BINGOL M A,et al.A New Security and Privacy Framework for RFID in Cloud Computing[C]∥IEEEInternational Conference on Cloud Computing Technology and Science.Bristol,UK,IEEE,2013:171-176.
    [17]GUO Y M,LI S D,CHEN Z H,et al.A lightweight privacy-preserving grouping proof protocol for RFID systems[J].Tien Tzu Hsueh Pao/acta Electronica Sinica,2015,43(2):289-292.
    [18]ZHANG R,ZHU L,XU C,et al.An Efficient and Secure RFIDBatch Authentication Protocol with Group Tags Ownership Transfer[C]∥Conference on Collaboration and Internet Computing.Hangzhou,China,IEEE,2015:168-175.
    [19]BURROWS M,ABADI M,NEEDHAM R M.A logic of authentication[J].Proceedings of the Royal Society A Mathematical Physical&Engineering Sciences,1989,426(1871):1-13.