计算机应用 ›› 2016, Vol. 36 ›› Issue (3): 657-660.DOI: 10.11772/j.issn.1001-9081.2016.03.657

• 网络空间安全 • 上一篇    下一篇

基于Hash函数的移动双向认证协议

陶源1,2, 周喜1, 马玉鹏1, 赵凡1   

  1. 1. 中国科学院 新疆理化技术研究所, 乌鲁木齐 830011;
    2. 中国科学院大学 计算机与控制学院, 北京 100049
  • 收稿日期:2015-08-26 修回日期:2015-10-29 出版日期:2016-03-10 发布日期:2016-03-17
  • 通讯作者: 陶源
  • 作者简介:陶源(1991-),女,吉林通化人,硕士研究生,主要研究方向:物联网应用技术、信息安全;周喜(1978-),男,湖南双峰人,研究员,博士,主要研究方向:物联网应用技术、大数据分析;马玉鹏(1979-),男,新疆阜康人,副研究员,博士,主要研究方向:物联网应用技术、大数据分析;赵凡(1980-),男,山西介休人,副研究员,博士研究生,主要研究方向:信息安全、大数据分析。
  • 基金资助:
    中国科学院西部之光人才培养计划项目(RCPY201205)。

Mobile mutual authentication protocol based on Hash function

TAO Yuan1,2, ZHOU Xi1, MA Yupeng1, ZHAO Fan1   

  1. 1. Xinjiang Technical Institute of Physics and Chemistry, Chinese Academy of Sciences, Urumqi Xinjiang 830011, China;
    2. School of Computer and Control Engineering, University of Chinese Academy of Sciences, Beijing 100049, China
  • Received:2015-08-26 Revised:2015-10-29 Online:2016-03-10 Published:2016-03-17
  • Supported by:
    This work is partially supported by the Training Plan of the Chinese Academy of Sciences West Light Foundation (RCPY201205).

摘要: 针对移动射频识别(RFID)系统中因无线传输所带来的信道不安全问题,充分考虑到协议的复杂程度和标签的硬件成本,提出一种低成本的移动双向认证协议,实现了标签、读写器和后端服务器三者的相互认证。该协议使用模平方运算动态更新标签标识符,引入读写器标识符,并利用伪随机函数和哈希函数强化读写器和后端服务器之间的身份认证,提高系统移动性。与基于哈希函数的经典协议和标签所有权转移协议相比,该协议可抵抗跟踪、假冒、重放、中间人、拒绝服务器攻击等,能保证标签所有权安全转移,并从计算量和存储量分析效率,结果表明标签计算量减少,存储量较低。

关键词: 射频识别, 低成本, 哈希函数, 所有权转移, 双向认证, 移动性

Abstract: Aiming at the problem of channel insecurity caused by wireless transmission in mobile Radio Frequency IDentification (RFID) system, a low-cost mobile mutual authentication protocol based on the Hash function was proposed by considering the complexity of the protocol and the implementation cost of the tag. In the protocol, the square operation was used to dynamically update the tag identifier. And the reader identifier, the pseudo random function and Hash function were used to enhance the identity authentication between the reader and the back-end server, which can improve the mobility of the system. Compared with the typical authentication protocols based on the Hash function and the tag ownership transfer protocol, this proposed protocol can resist tracking, impersonation, replay, man-in-the-middle, Denial of Service (DoS) attacks, etc., which can ensure the security of tag ownership transfer. The efficiency of calculation and storage was analyzed, and the results show that the calculation of the tag is reduced and the storage capacity is lower.

Key words: Radio Frequency IDentification (RFID), low-cost, Hash function, ownership transfer, mutual authentication, mobility

中图分类号: