作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2012, Vol. 38 ›› Issue (01): 264-267. doi: 10.3969/j.issn.1000-3428.2012.01.087

• 开发研究与设计技术 • 上一篇    下一篇

读写器可移动的RFID高效认证协议

张亚玲1,张超奇1,马巧梅2   

  1. (1. 西安理工大学计算机科学与工程学院,西安 710048;2. 宝鸡文理学院计算机科学系,陕西 宝鸡 721007)
  • 收稿日期:2011-05-30 出版日期:2012-01-05 发布日期:2012-01-05
  • 作者简介:张亚玲(1966-),女,教授,主研方向:网络与信息安全;张超奇、马巧梅,硕士研究生
  • 基金资助:
    国家自然科学基金资助项目(60873268, 61173192);陕西省教育厅2009年度科学研究计划基金资助项目(09JK678);西安理工大学博士基金资助项目(116210902)

Efficient Authentication Protocol for RFID with Mobile Reader and Writer

ZHANG Ya-ling 1, ZHANG Chao-qi 1, MA Qiao-mei 2   

  1. (1. College of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China; 2. Department of Computer Science, Baoji University of Art and Sciences, Baoji 721007, China)
  • Received:2011-05-30 Online:2012-01-05 Published:2012-01-05

摘要: 无线射频识别(RFID)对后端数据库的搜索效率低,且读写器的移动性差。针对该问题,基于ElGamal重加密算法,提出一种读写器可离线工作的RFID安全协议,利用GNY逻辑证明该协议的安全性。理论分析结果表明,其能抵抗重传攻击、去同步化攻击、假冒攻击、针对标签的隐私攻击,减少后端数据库的搜索次数,降低Hash计算量,提高执行效率。

关键词: 无线射频识别, 认证协议, ElGamal算法, Hash函数, GNY逻辑

Abstract: Aiming at the low efficiency of searching back-end data base and the poor mobility of reader in the existing Radio Frequency Identification(RFID) protocols, this paper proposes a new RFID protocol with ElGamal re-encryption algorithm, and uses GNY logic to prove security analysis of the new protocol by using the GNY logic shows that it is secure against the attacks such as retransmission, desynchronization, and impersonation, and it can resist the privacy attack on the tag. As both the number of searching back-end data base and the computational quantities of Hash algorithm in the new protocol are reduced, the new protocol is of high efficiency.

Key words: Radio Frequency Identification(RFID), authentication protocol, ElGamal algorithm, Hash function, GNY logic

中图分类号: