计算机应用 ›› 2011, Vol. 31 ›› Issue (03): 805-807.

• 信息安全 • 上一篇    下一篇

结合Hash函数和密钥阵列的RFID安全认证协议

谢川   

  1. 重庆工商大学 计算机科学与信息工程学院,重庆400067
  • 收稿日期:2010-08-18 修回日期:2010-10-09 发布日期:2011-03-03 出版日期:2011-03-01
  • 通讯作者: 谢川
  • 作者简介:谢川(1971-),男(土家族),重庆黔江人,讲师,硕士研究生,主要研究方向:网络与通信、物联网。
  • 基金资助:
    重庆市科技攻关项目(CSTC2010AA2036)

RFID authentication protocol based on Hash function and key array

XIE Chuan   

  1. College of Computer Science and Information Engineering, Chongqing Technology and Business University, Chongqing 400067, China
  • Received:2010-08-18 Revised:2010-10-09 Online:2011-03-03 Published:2011-03-01
  • Contact: XIE Chuan

摘要: 无线传输、信号广播、资源受限等特点使无线射频识别(RFID)技术存在潜在的安全隐患。在分析目前常见的RFID认证协议基础上,提出一种结合单向Hash函数和密钥阵列的安全认证协议。新协议在认证过程中使用单向Hash函数值代替标签标识符ID,并为每一对阅读器和标签之间设计独立的认证密钥,在抵抗包括窃听、位置跟踪、重传攻击、拒绝服务和篡改等多种攻击的基础上,进一步增强了标签信息的私密性,对抵御来自系统内部的威胁具有明显的优势。

关键词: 无线射频识别, 标签, 阅读器, 后台服务器, 认证协议, 哈希函数

Abstract: Wireless transmission, broadcast of signals, resource-constraint disturb the reliability of Radio Frequency Identification (RFID) system and block the deployment progress of RFID techniques. Through the analysis of current common RFID authentication protocol, an authentication protocol based on Hash function and key array was proposed. The new protocol used one-way Hash function value instead of label identifier, and designed independent authentication key for each pair between the reader and the tag in the certification process. It could resist several possible attacks, including eavesdropping, location tracking, re-transmission attacks, Denial of Service (DoS), tampering and other attacks. It has obvious advantages in enhancing the tag identity privacy, and resisting the threat from within the system.

Key words: Radio Frequency Identification (RFID), tag, reader, back-end server, authentication protocol, Hash function

中图分类号: