首页> 外文会议>IEEE International Conference on Mobile Services >Ultralightweight RFID Reader-Tag Mutual Authentication Revisited
【24h】

Ultralightweight RFID Reader-Tag Mutual Authentication Revisited

机译:UltraLightwight RFID读取器标签相互认证重新审视

获取原文

摘要

The RFID (Radio Frequency Identification) technology plays an important role of providing mobile services in Internet of Things (IoT) environments. In an RFID (Radio Frequency Identification) system, a tag with a unique ID is attached to an object and a reader can recognize the object by identifying the attached tag. With this identified tag ID, the reader can then retrieve the related information of the object from the backend server database and even access IoT-aware services associated with the object. Due to the nature of RF signals, the communication between the reader and tags is vulnerable to attacks. Typical attacks include the man-in-the-middle (MitM), replay, forward secrecy, denial of service (DoS), and impersonation attacks. Due to the extremely small memory and very limited computation power of tags, some RFID reader-tag mutual authentication schemes, like Huang and Jiang's scheme, Yi et al.'s scheme and Khedr's scheme, have been proposed to resist these attacks by using on-tag ultra lightweight operations, such as the random number generation (RNG), the pseudo random number generator (PRNG), the cyclic redundancy check (CRC), the exclusive-or (XOR), and lightweight cryptographic hash function (LHash) operations. These schemes still have some flaws, though. This paper proposes an improved mutual authentication scheme using only ultra lightweight operations to resist more attacks and/or achieve lower communication, computation, and tag memory overheads.
机译:RFID(射频识别)技术在物联网(物联网)环境中提供移动服务的重要作用。在RFID(射频识别)系统中,具有唯一ID的标签附加到对象,读取器可以通过识别附加的标记来识别对象。利用该标识的标签ID,读取器可以从后端服务器数据库检索对象的相关信息,甚至可以访问与对象相关联的IoT感知服务。由于RF信号的性质,读者和标签之间的通信容易攻击。典型的攻击包括中间人(MITM),重播,转发保密,拒绝服务(DOS)和模拟攻击。由于极小的内存和标签的计算能力非常有限,一些RFID读卡器标签相互认证方案,如黄和江的计划,yi等人的计划和khedr的计划,已经提出通过使用抵制这些攻击-TAG超轻量级操作,如随机数生成(RNG),伪随机数发生器(PRNG),循环冗余校验(CRC),独占或(XOR)和轻量级加密散列函数(LHASH)操作。但这些方案仍然有一些缺陷。本文提出了一种改进的相互认证方案,仅使用超轻量级操作来抵抗更多攻击和/或实现较低的通信,计算和标签存储器开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号