[1]朱炜玲,喻建平.物联网RFID系统隐私保护三方认证协议[J].深圳大学学报理工版,2012,29(No.2(095-188)):95-99.[doi:10.3724/SP.J.1249.2012.02095]
 ZHU Wei-ling and YU Jian-ping.A privacy preserving three-party authentication protocol for RFID systems in the internet of things[J].Journal of Shenzhen University Science and Engineering,2012,29(No.2(095-188)):95-99.[doi:10.3724/SP.J.1249.2012.02095]
点击复制

物联网RFID系统隐私保护三方认证协议()
分享到:

《深圳大学学报理工版》[ISSN:1000-2618/CN:44-1401/N]

卷:
第29卷
期数:
2012年No.2(095-188)
页码:
95-99
栏目:
电子与信息科学
出版日期:
2012-03-23

文章信息/Info

Title:
A privacy preserving three-party authentication protocol for RFID systems in the internet of things
作者:
朱炜玲喻建平
深圳大学ATR国防科技重点实验室,深圳 518060
Author(s):
ZHU Wei-ling and YU Jian-ping 
ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, P.R.China
关键词:
数据安全物联网射频识别隐私保护认证协议会话密钥GNY逻辑
Keywords:
data security internet of things radio frequency identification privacy preserving authentication protocol session key GNY logic
分类号:
TP 309; TN 918.91
DOI:
10.3724/SP.J.1249.2012.02095
文献标志码:
A
摘要:
设计一种适用于物联网射频识别(radio frequency identification, RFID)系统被动式低成本标签的隐私保护认证协议.采用对称加密算法、Hash函数及随机数相结合的方式,实现标签、阅读器与后台数据库三方认证,并在认证过程中建立会话密钥,防止标签携带者被非法阅读器访问及秘密追踪.GNY逻辑对协议分析证明了协议的安全性及可达到的认证目的.与He等人的AKAP和Chen等人提出的协议相比,该协议在标签计算量、通信次数及实现功能方面具有一定的综合优势.
Abstract:
For radio frequency identification(RFID) systems in the Internet of things, a privacy preserving authentication protocol was designed using passive low-cost tags. In this proposed protocol, the authentication between the tag, reader and backend database is implemented through a symmetric cryptosystem, a hash function, and a random number generator. It is also compliant with a shared session key between the reader and the tag. Furthermore, it protects legal tags from illegal access and clandestine tracking. The security of the protocol is proved by GNY logic formal analysis. This protocol has more advantages for computing, communication and functions compared with AKAP and the protocol proposed by Chen.

参考文献/References:

 [1] Atzori L, Iera A, Morabito G. The internet of things: a survey [J]. Computer Netwworks, 2010, 54(15): 2787-2805.
[2] Lee H J, Kim J Y. Privacy threats and issues in mobile RFID [C]// Proceedings of the First International Conference on Availability, Reliability and Security. Los Alamitos(USA): IEEE Press, 2006:510-514.
[3] Juels A. RFID security and privacy: a research survey[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2):381-394.
[4] Alomair B, Poovendran R. Privacy versus scalability in radio frequency identification systems [J]. Computer Communication, 2010, 33(18): 2155-2163.
[5] Sadeghi A R, Visconti I, Wachsmann C. Location privacy in RFID applications [C]// The 1st International Workshop on Privacy in Location-based Applications. Berlin: Springer-Verlag, 2009: 127-150.
[6] Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C]// The 2nd international Conference on Security in Pervasive Computing. Berlin: Springer-Verlag, 2005:70-84.
[7] Chen C L, Jan J K,Chie C F. Based on mobile RFID device to design a secure mutual authentication scheme for market application [C]// International Conference on Broadband, Wireless Computing, Communication and Applications. Los Alamitos(USA): IEEE Computer Society, 2010: 423-428.
[8] Henrici D, Muller P. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers [C]// The 2nd IEEE Annual Conference on Pervasive Computing and Communications. Los Alamitos(USA): IEEE Computer Society, 2004: 149-153.
[9] He L, Gan Y, Li N N, et al. A Security- provable authentication and key agreement protocol in RFID system [C]// The 3rd International Conference on Wireless Communications, Networking and Mobile Computing. New York: IEEE Press, 2007: 2078-2080.
[10] Zhou S J, Zhang Z, LUO Z W, et al. A lightweight anti-desynchronization RFID authentication protocol [J]. Information System Frontiers, 2010, 12(5): 521-528.
[11] Park N, Won D. Dynamic privacy protection for mobile RFID service [C]// RFID Security: Techniques, Protocols and System-on-Chip Design. Berlin: Springer-Verlag, 2009: 229-254.
[12] Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C]// IEEE Computer Society Symposium on Research in Security and Privacy. Los Alamitos(USA): IEEE Computer Society, 1990: 234-248.
[13] Wu K J, Bai E J, Zhang W. A hash-based authentication protocol for secure mobile RFID systems [C]// The 1st International Conference on Information Science and Engineering. Piscataway(USA): IEEE Press, 2009:2440-2443.

相似文献/References:

[1]梁正平,纪震,林佳利,等.基于三维编码的全流程食品追溯系统[J].深圳大学学报理工版,2010,27(3):312.
 LIANG Zheng-ping,JI Zhen,LIN Jia-li,et al.A whole course food tracing system based on three dimensional code[J].Journal of Shenzhen University Science and Engineering,2010,27(No.2(095-188)):312.
[2]闫巧,宁土文.基于矩阵边采样的IP追踪[J].深圳大学学报理工版,2012,29(No.5(377-470)):399.[doi:10.3724/SP.J.1249.2012.05399]
 YAN Qiao and NING Tu-wen.IP traceback with matrix edge sampling[J].Journal of Shenzhen University Science and Engineering,2012,29(No.2(095-188)):399.[doi:10.3724/SP.J.1249.2012.05399]
[3]田传俊.频率不相关性及其在单钥密码系统中的应用[J].深圳大学学报理工版,2015,32(1):32.[doi:10.3724/SP.J.1249.2015.01032]
 Tian Chuanjun.Frequency irrelevance and its applications in one-key cryptosystems[J].Journal of Shenzhen University Science and Engineering,2015,32(No.2(095-188)):32.[doi:10.3724/SP.J.1249.2015.01032]
[4]陈国良,毛睿,蔡晔.高性能计算及其相关新兴技术[J].深圳大学学报理工版,2015,32(1):25.[doi:10.3724/SP.J.1249.2015.01025]
 Chen Guoliang,Mao Rui,and Cai Ye.High performance computing and related new technologies[J].Journal of Shenzhen University Science and Engineering,2015,32(No.2(095-188)):25.[doi:10.3724/SP.J.1249.2015.01025]
[5]郭文杰,张应辉,郑东.云存储中支持词频和用户喜好的密文模糊检索[J].深圳大学学报理工版,2015,32(5):532.[doi:10.3724/SP.J.1249.2015.05532]
 Guo Wenjie,Zhang Yinghui,et al.Fuzzy search over encrypted data supporting word frequencies and user preferences in cloud storage[J].Journal of Shenzhen University Science and Engineering,2015,32(No.2(095-188)):532.[doi:10.3724/SP.J.1249.2015.05532]

备注/Memo

备注/Memo:
Received:2011-04-13;Revised:2011-10-08;Accepted:2012-02-14
Foundation:National Natural Science Foundation of China(61001058, 61171072)
Corresponding author:Professor YU Jian-ping. E-mail:yujp@szu.edu.c
Citation:ZHU Wei-ling, YU Jian-ping. A privacy preserving three-party authentication protocol for RFID systems in the internet of things[J]. Journal of Shenzhen University Science and Engineering, 2012, 29(2): 95-99.(in Chinese)
基金项目:国家自然科学基金资助项目(61001058 , 61171072)
作者简介:朱炜玲(1975-),女(汉族),湖南省汝城县人,深圳大学博士研究生. E-mail:lynn_zhuwl@hotmail.com
引文:朱炜玲, 喻建平. 物联网RFID系统隐私保护三方认证协议[J]. 深圳大学学报理工版,2012,29(2):95-99.
更新日期/Last Update: 2012-03-28