• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

计算机工程与科学

• 计算机网络与信息安全 • 上一篇    下一篇

基于PUF适用于大规模RFID系统的移动认证协议

李松1,孙子文1,2   

  1. (1.江南大学物联网工程学院,江苏 无锡 214122;2.物联网技术应用教育部工程研究中心,江苏 无锡 214122)
  • 收稿日期:2016-12-12 修回日期:2017-04-12 出版日期:2018-06-25 发布日期:2018-06-25
  • 基金资助:

    国家自然科学基金 (61373126);中央高校基本科研业务费专项资金(JUSRP51510)

PUF based authentication protocol in 
mobile and largescale RFID systems

LI Song1,SUN Ziwen1,2   

  1. (1.School of Internet of Things Engineering,Jiangnan University,Wuxi 214122;
    2.Engineering Research Center of Internet of Things Technology Applications,Ministry of Education,Wuxi 214122,China)
  • Received:2016-12-12 Revised:2017-04-12 Online:2018-06-25 Published:2018-06-25

摘要:

针对移动射频识别系统中的安全问题,采用物理不可克隆函数研究适用于大规模RFID系统的移动认证协议。为解决移动RFID认证环境下读写器易遭受假冒攻击的问题,在Vaudenay模型中加入攻击者入侵读写器的能力,并通过服务器对读写器的身份认证来抵御攻击者的假冒攻击;为解决标签的运算能力不足问题和服务器搜索标签耗时长的问题,采用PUF生成会话密钥来减轻标签加密过程中的运算量,服务器通过共享密钥异或运算实现对检索标签和读写器身份标识的快速检索。利用Vaudenay模型理论,分析和证明了研究的协议可实现Destructive等级的隐私保护;仿真结果表明,PMLS协议中服务器的搜索耗时不随标签数目增长而加长,满足大规模移动RFID系统的应用要求。
 

关键词: 无线射频识别, 物理不可克隆函数, Vaudenay模型, 安全认证, 隐私保护

Abstract:

 

Aiming at the security problem in mobile radio frequency identification (RFID) systems, we employ the physical unclonable function (PUF) to study authentication protocol in mobile and largescale RFID systems. To solve the problem of impersonation attack to the reader, the Vaudenay’s model is extended by introducing the corrupting ability of the adversary to the reader and the reader is further authenticated by the server. To solve the problem of insufficient computation ability of tag and longtime cost of the server for  searching target tag, the PUF is adopted to generate the session key to reduce the computation cost of tag encryption, and the server quickly identifies the tag and the reader using the shared key XOR operations. Our analysis proves that the proposed security protocol can realize destructive privacy according to the Vaudenay's model theory. Simulation results show that the search time of the server in PMLS protocol does not increase with the number of the tag by using the proposed security protocol, which meets the application requirements of mobile and large scale RFID systems.
 

Key words: RFID, PUF, Vaudenay&rsquo, s model, security anthentication, privacy protection