[1]谢海宝,吕 磊.基于伪随机数发生器的双向认证协议[J].计算机技术与发展,2022,32(01):128-133.[doi:10. 3969 / j. issn. 1673-629X. 2022. 01. 022]
 XIE Hai-bao,LYU Lei.Mutual Authentication Protocol Based on Pseudo RandomNumber Generator[J].,2022,32(01):128-133.[doi:10. 3969 / j. issn. 1673-629X. 2022. 01. 022]
点击复制

基于伪随机数发生器的双向认证协议()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
32
期数:
2022年01期
页码:
128-133
栏目:
网络与安全
出版日期:
2022-01-10

文章信息/Info

Title:
Mutual Authentication Protocol Based on Pseudo RandomNumber Generator
文章编号:
1673-629X(2022)01-0128-06
作者:
谢海宝1 吕 磊2
1. 河南省市场监督管理局 信息中心,河南 郑州 450008;
2. 河南工业大学 信息科学与工程学院,河南 郑州 450008
Author(s):
XIE Hai-bao1 LYU Lei2
1. Information Center,Administration for Market Regulation of Henan Province,Zhengzhou 450008,China;
2. School of Information Science and Engineering,Henan University of Technology,Zhengzhou 450008,China
关键词:
物联网射频识别系统双向认证伪随机数发生器时钟周期数
Keywords:
internet of thingsRFID systemmutual authenticationpseudo random number generatornumber of clock cycles
分类号:
TP393. 08
DOI:
10. 3969 / j. issn. 1673-629X. 2022. 01. 022
摘要:
射频识别系统中电子标签与读写器间基于无线链路交互数据信息,因无线链路自身具有的开放性,使得两者间交互的数据信息易被第三方人员获取,存在一定的? 安全隐患。 为解决该安全问题,文中给出了一种基于伪随机数发生器的认证协议。 协议摒弃经典加密算法对信息加密,而是采用伪随机数发生器实现对信息的加密,伪随机数发生器的实现具备时钟周期数少、门电路总数少等优势,能够降低射频识别系统的整体成本;协议为能够有效保持交互数据信息的新鲜性,在数据加密过程中均混入随机数,随机数由随机数产生器产生,具有互异性、不可预测性等优势,在保持信息新鲜性的同时,亦可抵抗第三方人员发起的诸如定位攻击、重放攻击等攻击。 将该协议与其他经典协议进行安全及性能对比,表明该协议在可抵抗假冒攻击、异步攻击等常见类型攻击时,还具备较低的成本开销。
Abstract:
In RFID system,the interactive data information between the tag and the reader is based on the wireless link. Because of theopenness of the wireless link itself,the interactive data information between the tag and the reader is easy to be obtained by the thirdparty. There are some security risks. In order to solve the security problem,an authentication protocol based on pseudo-random numbergenerator is proposed. The protocol abandons the classical encryption algorithm to encrypt the information,but uses the pseudo-randomnumber generator to encrypt the information. The implementation of the pseudo - random number generator has the advantages of lessclock cycles and fewer gates,which can reduce the overall cost of the RFID system. In order to effectively maintain the freshness of theinteractive data information,the protocol mixes the random number in the data encryption process. The random number is generated bythe random number generator, which has the advantages of heterogeneity and unpredictability. While maintaining the freshness ofinformation, it can also resist the attack types such as location attack and replay attack launched by the third party. Compared with otherclassical protocols in terms of security and performance,it shows that the proposed protocol has lower cost when it can resist commontypes of attacks such as impersonation attack and asynchronous attack.

相似文献/References:

[1]郭苑 张顺颐 孙雁飞.物联网关键技术及有待解决的问题研究[J].计算机技术与发展,2010,(11):180.
 GUO Yuan,ZHANG Shun-yi,SUN Yan-fei.Research of Key Technologies and Unresolved Questions of Internet of Things[J].,2010,(01):180.
[2]于群英 李媛 杨文荣.基于轻量级J2EE的网站群管理系统开发架构[J].计算机技术与发展,2011,(04):48.
 YU Qun-ying,LI Yuan,YANG Wen-rong.Research of Development Framework of Multi-Websites Management System Based on Lighter J2EE[J].,2011,(01):48.
[3]张捍东 朱林.物联网中的RFID技术及物联网的构建[J].计算机技术与发展,2011,(05):56.
 ZHANG Han-dong,ZHU Lin.RFID Technology and Structure of Internet of Things[J].,2011,(01):56.
[4]任长城 马雏.智能家居中基于认知无线电的通信协议设计[J].计算机技术与发展,2011,(08):14.
 REN Chang-cheng,MA Chu.A Design of Cognitive Radio Communication Protocol in Smart Home[J].,2011,(01):14.
[5]蔡晓 骆德汉 郑魏 余庆悦.基于RFID的家电监控追踪系统的设计实现[J].计算机技术与发展,2011,(10):176.
 CAI Xiao,LUO De-han,ZHENG Wei,et al.Design and Implementation of Household Appliance ts Monitoring and Tracking System[J].,2011,(01):176.
[6]孙文歌 魏振方 江俊斌.IPv6链路本地地址安全技术研究[J].计算机技术与发展,2011,(10):237.
 SUN Wen-ge,WEI Zhen-fang,JIANG Jun-bin.Study of Link-Local Address Security in IPv6[J].,2011,(01):237.
[7]赵旭 秦雅娟.泛在绿色社区控制网络协议研究与分析[J].计算机技术与发展,2011,(12):13.
 ZHAO Xu,QIN Ya-juan.Study on Ubiquitous Green Community Control Network Protocol[J].,2011,(01):13.
[8]李园园 毕晓冬 张永胜 韩贝贝[].物联网框架安全威胁及相应策略研究[J].计算机技术与发展,2011,(12):148.
 LI Yuan-yuan,BI Xiao-dong,ZHANG Yong-sheng,et al.Framework and Security Threats on Internet of Things and Survey of Corresponding Strategies[J].,2011,(01):148.
[9]周天剑 王震 姚沁 许鸿锦.基于RFID盲人导航系统[J].计算机技术与发展,2011,(12):217.
 ZHOU Tian-jian,WANG Zhen,YAO Qin,et al.Blind Navigation System Based on RFID[J].,2011,(01):217.
[10]崔英 张宏科 秦雅娟 郑涛.基于IPv6无线传感器网络的室内照明控制系统[J].计算机技术与发展,2011,(12):230.
 CUI Ying,ZHANG Hong-ke,QIN Ya-jua,et al.Design and Implementation of Indoor Lighting Control System Based on IPv6 Wireless Sensor Network[J].,2011,(01):230.

更新日期/Last Update: 2022-01-10