[1]张学军,常昆,王玉. 基于标签编组的RFID相互认证协议[J].计算机技术与发展,2015,25(04):102-107.
 ZHANG Xue-jun,CHANG Kun,WANG Yu. An RFID Mutual Authentication Protocol Based on Tag Grouping[J].,2015,25(04):102-107.
点击复制

 基于标签编组的RFID相互认证协议()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年04期
页码:
102-107
栏目:
安全与防范
出版日期:
2015-04-10

文章信息/Info

Title:
 An RFID Mutual Authentication Protocol Based on Tag Grouping
文章编号:
1673-629X(2015)04-0102-06
作者:
 张学军常昆王玉
 南京邮电大学 电子科学与工程学院
Author(s):
 ZHANG Xue-junCHANG Kun WANG Yu
关键词:
 射频识别技术相互认证协议标签编组BAN逻辑
Keywords:
 radio frequency identificationmutual authentication protocoltag groupingBAN logic
分类号:
TP391.45 TP309.2
文献标志码:
A
摘要:
 探究了当前RFID安全认证协议中较少涉及的标签编组领域,分析了典型标签编组协议Yoking Proof的安全问题,提出了基于标签编组的RFID相互认证协议( MATG)。 MATG协议将同类标签进行编组,在协议相互认证过程中,阅读器能选择特定的标签组,并在一次协议过程中自动完成对组中所有标签的识别。对所提出协议的安全性进行了分析和BAN逻辑证明,并用C语言编程进行了重放攻击仿真。理论分析和仿真结果显示,MATG协议克服了Yoking Proof协议的缺陷,提高了成组商品标签的识别效率和安全性。
Abstract:
 Explore the tag grouping field less involved in current RFID security authentication protocol,Yoking Proof protocol’ s security problems are analyzed. An RFID Mutual Authentication protocol based on Tag Grouping ( MATG) was proposed. The same tags are grouped by MATG,reader can select a group of tags in the mutual authentication process,and then identify targets automatically in a pro-tocol processing. Safety of the proposed protocol is analyzed and proved with the BAN logic,and then attack simulation is performed u-sing C programming language. Theoretic analysis and simulation results show that MATG protocol overcomes Yoking Proof protocol’ s shortcomings and improves working efficiency and safety when dealing with a group of tags.

相似文献/References:

[1]刘富春 周受钦.基于RFID的物流装备信息监控网络平台设计[J].计算机技术与发展,2012,(07):227.
 LIU Fu-chun,ZHOU Shou-qin.Monitoring Framework Design for Logistics Equipment Based on RFID[J].,2012,(04):227.
[2]孙科学,张瑛,周明秀.跳跃式二进制防碰撞算法的设计与实现[J].计算机技术与发展,2013,(04):59.
 SUN Ke-xue,ZHANG Ying,ZHOU Ming-xiu.Design and Implementation of an Anti-collision Algorithm of Jumping Binary[J].,2013,(04):59.
[3]张学军,陈彦君,常昆.改进型RFID相互认证协议研究[J].计算机技术与发展,2013,(08):129.
 ZHANG Xue-jun[],CHEN Yan-jun[],CHANG Kun[].An Improved RFID Mutual Authentication Protocol[J].,2013,(04):129.
[4]张建敏,王钢.基于WSID网络的智能监测技术的研究与实现[J].计算机技术与发展,2014,24(02):202.
 ZHANG Jian-min,WANG Gang.Research and Implementation of Intelligent Monitoring Technology Based on WSID[J].,2014,24(04):202.
[5]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(04):1.
[6]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(04):5.
[7]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(04):13.
[8]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(04):21.
[9]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(04):25.
[10]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(04):29.
[11]张学军[][],马军飞[],鲁友[]. 基于位编码单元的双时隙防碰撞算法[J].计算机技术与发展,2014,24(09):93.
 ZHANG Xue-jun[][],MA Jun-fei[],LU You[]. A Bi-slot Anti-collision Algorithm Based on Bits Coding Unit[J].,2014,24(04):93.
[12]姜武,杨恒新,张昀. 一种改进的查询树RFID标签防碰撞算法[J].计算机技术与发展,2015,25(02):86.
 JIANG Wu,YANG Heng-xin,ZHANG Yun. An Improved Query Tree Anti-collision Algorithm in RFID Systems[J].,2015,25(04):86.

更新日期/Last Update: 2015-06-04