浏览全部资源
扫码关注微信
1. 解放军信息工程大学网络空间安全学院,河南 郑州 450001
2. 数学工程与先进计算国家重点实验室,河南 郑州 450001
[ "潘耀民(1993-),男,河南新乡人,解放军信息工程大学硕士生,主要研究方向为网络安全、物联网安全。" ]
[ "单征(1977-),男,辽宁沈阳人,博士,解放军信息工程大学副教授、硕士生导师,主要研究方向为先进计算、网络安全。" ]
[ "戴青(1963-),男,辽宁沈阳人,解放军信息工程大学副教授、硕士生导师,主要研究方向为网络安全、物联网安全和高性能计算。" ]
[ "岳峰(1985-),男,山西长治人,博士,解放军信息工程大学讲师,主要研究方向为高性能计算与信息安全。" ]
网络出版日期:2017-08,
纸质出版日期:2017-08-25
移动端阅览
潘耀民, 单征, 戴青, 等. 大规模RFID系统中基于CPK-ECC的双向认证协议[J]. 通信学报, 2017,38(8):165-171.
Yao-min PAN, Zheng SHAN, Qing DAI, et al. CPK-ECC based mutual authentication protocol for large-scale RFID system[J]. Journal on communications, 2017, 38(8): 165-171.
潘耀民, 单征, 戴青, 等. 大规模RFID系统中基于CPK-ECC的双向认证协议[J]. 通信学报, 2017,38(8):165-171. DOI: 10.11959/j.issn.1000-436x.2017174.
Yao-min PAN, Zheng SHAN, Qing DAI, et al. CPK-ECC based mutual authentication protocol for large-scale RFID system[J]. Journal on communications, 2017, 38(8): 165-171. DOI: 10.11959/j.issn.1000-436x.2017174.
针对现有射频识别(RFID,radio frequency identification)认证协议扩展性较差的问题,分析了大规模RFID系统认证协议的设计需求与CPK的技术优势,提出基于CPK-ECC的认证协议。协议采用椭圆曲线加密方案与改进的快速数字签名算法,实现了双向认证与离线认证。进一步给出安全性分析,指出协议可以有效抵御已有安全与隐私攻击。与其他基于 ECC 的认证协议相比,协议支持无后端服务器认证,扩展性好,性能更优,适用于大规模RFID系统。
The existing RFID authentication protoco1s were short of sca1abi1ity.Taking advantage of combined pub1ic key(CPK),a CPK-ECC based authentication protoco1 was proposed considering the design demand of authentication protoco1s for 1arge-sca1e RFID system.The protoco1 imp1ements mutua1 and server1ess authentication by adoption of the e11iptic curve encryption scheme and the improved digita1 signature a1gorithm.Based on the security ana1ysis,the protoco1 can resist the existing security and privacy attacks effective1y.Compared with other ECC-based protoco1s,the server1ess protoco1 has better sca1abi1ity and performance,suitab1e for 1arge-sca1e RFID systems.
HEIN D , WOLKERSTORFER J , FELBER N . ECC is ready for RFID-a proof in silicon [C ] // Selected Areas in Cryptography.Springer Berlin Heidelberg . 2008 : 401 - 413 .
TUYLS P , BATINA L . RFID-tags for anti-counterfeiting [C ] // Crypto Topics in Cryptology . 2006 : 115 - 131 .
BATINA L , GUAJARDO J , KERINS T , et al . Public-key cryptography for RFID-tags [C ] // International Workshop on Pervasive Computing & Communication Security-PERSEC . 2007 : 217 - 222 .
YONG K L , BATINA L , VERBAUWHEDE I . EC-RAC(ECDLP based randomized access control):provably secure RFID authentication protocol [C ] // IEEE International Conference on RFID . 2008 : 97 - 104 .
YONG K L , BATINA L , VERBAUWHEDE I . Untraceable RFID authentication protocols:revision of EC-RAC [C ] // IEEE International Conference on RFID . 2009 : 178 - 185 .
YONG K L , BATINA L , SINGELÉE D , et al . Wide-weak privacypreserving RFID authentication protocols [M ] . Mobile Lightweight Wireless Systems,Springer Berlin Heidelberg , 2010 : 254 - 267 .
CHOU J S , CHEN Y , WU C L , et al . An efficient RFID mutual authentication scheme based on ECC [J ] . iacr Cryptology EPrint Archive , 2011 .
LIAO Y P , HSIAO C M . A secure ECC-based RFID authentication scheme using hybrid protocols [M ] . Advances in Intelligent Systems and Applications-Volume 2 , 2013 : 1 - 13 .
ZHAO Z . A Secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem [J ] . Journal of Medical Systems , 2014 , 38 ( 5 ): 1 - 7 .
杨玉龙 , 彭长根 , 周洲 , 等 . 基于Edwards曲线的移动RFID安全认证协议 [J ] . 通信学报 , 2014 , 35 ( 11 ): 132 - 138 .
YANG Y L , PENG C G , ZHOU Z , et al . Edwards curves based security authentication protocol for mobile RFID systems [J ] . Journal on Communications , 2014 , 35 ( 11 ): 132 - 138 .
TAN C C , SHENG B , LI Q . Secure and serverless RFID authentication and search protocols [J ] . IEEE Transactions on Wireless Communications , 2008 , 7 ( 4 ): 1400 - 1407 .
BURMESTER M , MEDEIROS B D , MOTTA R . Robust,anonymous RFID authentication with constant key-lookup [C ] // ACM Symposium on Information,Computer and Communications Security . 2008 : 283 - 291 .
YANG L , YU P , BAILING W , et al . IOT secure transmission based on integration of IBE and PKI/CA [J ] . International Journal of Control &Automation , 2013 , 6 ( 2 ): 245 - 253 .
张兵 , 秦志光 , 万国根 . 基于PKI和CPK的RFID系统混合密钥管理机制研究 [J ] . 电子科技大学学报 , 2015 , 44 ( 3 ): 415 - 421 .
ZHANG B , QIN Z G , WAN G G . Study on hybrid key management mechanisms of RFID system based on PKI and CPK [J ] . Journal of University of Electronic Science and Technology of China , 2015 , 44 ( 3 ): 415 - 421 .
南相浩 . CPK 公钥体制与标识鉴别 [M ] . 北京 : 电子工业出版社 , 2012 .
NAN X H . CPK Cryptosystem and identity authentication [M ] . Beijing : Publishing House of Electronics IndustryPress , 2012 .
高伟 , 张国印 , 王欣萍 , 等 . 一种改进的椭圆曲线数字签名算法 [J ] . 黑龙江大学自然科学学报 , 2010 , 27 ( 3 ): 775 - 780 .
GAO W , ZHANG G Y , WANG X P , et al . An improved elliptic curve digital signature algorithm [J ] . Journal of Natural Science of Heilongjiang University , 2010 , 27 ( 3 ): 775 - 780 .
HANKERSON D , MENEZES A , VANSTONE S . Guide to elliptic curve cryptography [M ] . Guide to elliptic curve cryptography,Springer Berlin Heidelberg , 2004 .
0
浏览量
1098
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构