计算机工程与科学 ›› 2023, Vol. 45 ›› Issue (01): 77-84.
寇广岳1,魏国珩1,平源2,刘鹏3
收稿日期:
2022-09-14
修回日期:
2022-10-29
接受日期:
2023-01-25
出版日期:
2023-01-25
发布日期:
2023-01-25
KOU Guang-yue1,WEI Guo-heng1,PING Yuan2,LIU Peng3
Received:
2022-09-14
Revised:
2022-10-29
Accepted:
2023-01-25
Online:
2023-01-25
Published:
2023-01-25
摘要: 在物联网发展中,RFID技术以其轻量化的优势在物联网体系中占据重要地位。同时,RFID安全认证协议也因物理条件限制受到安全威胁。首先,通过对现行主流RFID安全认证协议进行梳理,按加密算法的量级将其划分为超轻量级、轻量级、中量级和重量级安全认证协议;然后,对其中典型的安全认证协议存在的安全问题进行分析,对近年来提出的改进协议安全性能及性能指标按量级进行讨论比较;最后,探讨了RFID安全认证协议可能的发展方向。
寇广岳, 魏国珩, 平源, 刘鹏. RFID安全认证协议综述[J]. 计算机工程与科学, 2023, 45(01): 77-84.
KOU Guang-yue, WEI Guo-heng, PING Yuan, LIU Peng. Overview of RFID security authentication protocols[J]. Computer Engineering & Science, 2023, 45(01): 77-84.
[1] | RFID Forecasts, Players and Opportunities 2022-2032 the complete analysis of the global RFID industry[EB/OL].[2022-09-01]. https:∥www.idtechex.com/zh/research-report/rfid-forecasts-players-and-opportunities-2022-2032/849. |
[2] | Zhou Yong-bin,Feng Deng-guo.Design and analysis of cryptographic[J].Chinese Journal of Computers,2006,29(4):581-589.(in Chinese) |
[3] | Information technology—Radio frequency identification for item management: ISO/IEC 18000[S]. Switzerland: International Organization for Standardization, 2004. |
[4] | Cards and security devices for personal identification—Contactless proximity objects: ISO/IEC 14443[S]. Switzerland: International Organization for Standardization, 2018. |
[5] | Identification cards—Contactless integrated circuit cards—Vicinity cards: ISO/IEC 15693[S]. Switzerland: International Organization for Standardization, 2019. |
[6] | Information technology—Telecommunications and information exchange between systems—Nearfield communication —Interface and protocol(NFCIP-1): ISO/IEC18092[S]. Switzerland: International Organization for Standardization, 2013. |
[7] | Wang Ya,Wei Guo-heng,Wei Wei.Research on classification model of lightweight encryption algorithm for RFID applications[J].Computer & Digital Engineering,2017,45(6):1150-1155.(in Chinese) |
[8] | Wang Ya,Wei Guo-heng.A research summary on lightweight cryptographic algorithms for RFID[J].Computer Applications and Software,2017,34(1):9-14.(in Chinese) |
[9] | Hopper N J,Blum M.A secure human-computer authentication scheme[R].Pittsburgh :Carnegie Mellon University,2000. |
[10] | Peris-Lopez P, Hernandez-Castro J C,Estevez-Tapiador J M,et al.LMAP:A real lightweight mutual authentication protocol for low-cost RFID tags[C]∥Proc of the 2nd Workshop on RFID Security,2006:6-18. |
[11] | Peris-Lopez P, Hernandez-Castro J C,Estévez-Tapiador J M,et al.EMAP:An efficient mutual-authentication protocol for low-cost RFID tags[C]∥Proc of OTM Confederated International Conference on the Move to Meaningful Internet Systems,2006:352-361. |
[12] | Peris-Lopez P, Hernandez-Castro J C,Estévez-Tapiador J M,et al. M(2)AP:A minimalist mutual-authentication protocol for low-cost RFID tags[C]∥Proc of the 3rd International Conference on Ubiquitous and Computing,2006:912-923. |
[13] | Li T, Wang G.Security analysis of two ultra-lightweight RFID authentication protocols[C]∥Proc of IFIP International Information Security Conference,2007:109-120. |
[14] | Zhuang X,Zhu Y,Chang C C,et al.Security issues in ultralightweight RFID authentication protocols[J].Wireless Personal Communications,2018,98(1):779-814. |
[15] | Li T,Deng R.Vulnerability analysis of EMAP—An efficient RFID mutual authentication protocol[C]∥Proc of the 2nd International Conference on Availability,Reliability and Security,2007:238-245. |
[16] | Ain Q U,Mahmood Y,Mujahid U.Cryptanalysis of mutual ultralightweight authentication protocols:SASI & RAPP[C]∥Proc of 2014 International Conference on Open Source Systems & Technologies,2014:136-145. |
[17] | Zhuang X, Zhu Y, Chang C C, et al. Security issues in ultralightweight RFID authentication protocols[J].Wireless Personal Communications,2018,98:779-814. |
[18] | Gao M,Lu Y B.URAP:A new ultra-lightweight RFID authentication protocol in passive RFID system[J].The Journal of Supercomputing,2022,78(8):10893-10905. |
[19] | Mujahid U,Najam-Ul-Islam M,Shami M A.RCIA:A new ultralightweight RFID authentication protocol using recursive hash[J].International Journal of Distributed Sensor Networks,2015,11(1):642180. |
[20] | Zhong X,Xiao M,Zhang T,et al.Proving mutual authentication property of RCIA protocol in RFID based on logic of events[J].Chinese Journal of Electronics,2022,31(1):79-88. |
[21] | Luo H,Wen G,Su J,et al.SLAP:Succinct and lightweight authentication protocol for low-cost RFID system[J].Wireless Networks,2018,24(1):69-78. |
[22] | Zhuang X, Zhu Y,Chang C C.A new ultralight-weight RFID protocol for low-cost tags:R2AP[J].Wireless Personal Communications,2014,79(3):1787-1802. |
[23] | Zavvari A,Islam M T,Shakiba M,et al.Theoretical analysis of RFID security protocols[C]∥Proc of 2014 IEEE International Conference on Industrial Engineering and Engineering Management,2014:302-306. |
[24] | Vaudenay S.On privacy models for RFID[C]∥Proc of International Conference on the Theory and Application of Cryptology and Information Security,2007:68-87. |
[25] | Arslan A, Kardas S,Colak S A,et al.Are RNGs achilles’ heel of RFID security and privacy protocols?[J].Wireless Personal Communications,2018,100(4):1355-1375. |
[26] | Cherneva V, Trahan J L. A secure and efficient parallel- dependency RFID grouping-proof protocol[J].IEEE Journal of Radio Frequency Identification,2020,4(1):14-23. |
[27] | Sundaresan S,Doss R,Zhou W.Zero knowledge grouping proof protocol for RFID EPC C1G2 tags[J].IEEE Transactions on Computers,2015,64(10):2994-3008. |
[28] | Eslamnezhad N M, Hosseinzadeh M,Bagheri N,et al.A secure search protocol for lightweight and low-cost RFID systems[J].Telecommunication Systems,2018,67(4):539-552. |
[29] | Sundaresan S,Doss R,Piramuthu S,et al.Secure tag search in RFID systems using mobile readers[J].IEEE Transactions on Dependable and Secure Computing,2014,12(2):230-242. |
[30] | Xie S,Liang W,Xu J,et al.A novel bidirectional RFID identity authentication protocol[C]∥Proc of 2018 IEEE SmartWorld,Ubiquitous Intelligence & Computing,Advanced & Trusted Computing,Scalable Computing & Communications,Cloud & Big Data Computing,Internet of People and Smart City Innovation,2018:301-307. |
[31] | Sarma S E,Weis S A,Engels D W.RFID systems and secu- rity and privacy implications[C]∥Proc of International Workshop on Cryptographic Hardware and Embedded Systems,2002:454-469. |
[32] | Weis S A,Sarma S E,Rivest R L,et al.Security and privacy aspects of low-cost radio frequency identification systems[C]∥Proc of the 1st International Conference on Security in Pervasive Computing,2004:201-212. |
[33] | Ohkubo M, Suzuki K, Kinoshita S.Hash-chain based forward-secure privacy protection scheme for low-cost RFID[C]∥Proc of 2004 Symposium on Cryptography and Information Security,2004:719-724. |
[34] | Molnar D,Wagner D.Privacy and security in library RFID:Issues,practices,and architectures[C]∥Proc of the 11th ACM Conference on Computer and Communications Security,2004:210-219. |
[35] | Gope P, Hwang T.A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system[J].Computers & Security,2015,55:271-280. |
[36] | Tan X,Dong M,Wu C,et al.An energy-efficient ECC processor of UHF RFID tag for banknote anti-counterfeiting[J].IEEE Access,2016,5:3044-3054. |
[37] | Sundaresan S,Doss R,Piramuthu S,et al.A secure search protocol for low cost passive RFID tags[J].Computer Networks,2017,122:70-82. |
[38] | Liu B,Yang B,Su X.An improved two-way security authentication protocol for RFID system[J].Information,2018,9(4):86-99. |
[39] | Hosseinzadeh M,Lansky J,Rahmani A M,et al.A new strong adversary model for RFID authentication protocols[J].IEEE Access,2020,8:125029-125045. |
[40] | Wang B,Ma M.A server independent authentication scheme for RFID systems[J].IEEE Transactions on Industrial Informatics,2012,8(3):689-696. |
[41] | Mansoor K,Ghani A,Chaudhry S A,et al.Securing IoT-based RFID systems:A robust authentication protocol using symmetric cryptography[J].Sensors,2019,19(21):47-52. |
[42] | Golle P,Jakobsson M,Juels A,et al.Universal re-encryption for mixnets[C]∥Proc of Cryptographers’ Track at the RSA Conference,2004:163-178. |
[43] | Alamr A A, Kausar F,Kim J,et al.A secure ECC-based RFID mutual authentication protocol for internet of things[J].The Journal of Supercomputing,2018,74(9):4281-4294. |
[44] | Qian Y,Zeng P,Shen Z,et al.A lightweight path authentication protocol for RFID-based supply chains[C]∥Proc of the 17th IEEE International Conference on Trust,Security and Privacy in Computing and Communications/the 12th IEEE International Conference on Big Data Science and Engineering,2018:1297-1302. |
[45] | Singh A K,Patro B D K.Elliptic curve signcryption based security protocol for RFID[J].KSII Transactions on Internet and Information Systems,2020,14(1):344-365. |
[46] | Sun H,Su C,Chen S.A high security RFID system authentication protocol design base on cloud computer[J].Wireless Personal Communications,2018,102(2):1255-1267. |
[47] | Tu Y J,Kapoor G,Piramuthu S.On group owner-ship delegate protocol for RFID systems[J].Information Systems Frontiers,2021,24(5):1577-1584. |
[48] | Xie S,Zhang F,Cheng R.Security enhanced RFID authentication protocols for healthcare environment[J].Wireless Personal Communications,2021,117(1):71-86. |
[49] | Zhao Z.A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem[J].Journal of Medical Systems,2014,38(5):1-7. |
[50] | Zhang X,Li L,Wu Y,et al.An ECDLP-based randomized key RFID authentication protocol[C]∥Proc of 2011 International Conference on Network Computing and Information Security,2011:146-149. |
[51] | Liao Y P,Hsiao C M.A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol[J].Ad Hoc Networks,2014,18:133-146. |
[52] | Dinarvand N,Barati H.An efficient and secure RFID authentication protocol using elliptic curve cryptography[J].Wireless Networks,2019,25(1):415-428. |
[53] | Chien H Y.Elliptic curve cryptography-based RFID authentication resisting active tracking[J].Wireless Personal Communications,2017,94(4):2925-2936. |
[54] | Pakniat N,Eslami Z.Cryptanalysis and improvement of a group RFID authentication protocol[J].Wireless Net-works,2020,26(5):3363-3372. |
[55] | Liu Y,Sun Q,Wang Y,et al.Efficient group authentication in RFID using secret sharing scheme[J].Cluster Comput- ing,2019,22(4):8605-8611. |
[56] | Su J,Sheng Z,Leung V C M,et al.Energy efficient tag identification algorithms for RFID:Survey,motivation and new design[J].IEEE Wireless Communications,2019,26(3):118-124. |
[57] | Su J,Sheng Z,Liu A X,et al.A group-based binary splitting algorithm for UHF RFID anti-collision systems[J].IEEE Transactions on Communications,2019,68(2):998-1012. |
[58] | Su J,Sheng Z,Xie L,et al.Fast splitting-based tag identification algorithm for anti-collision in UHF RFID system[J].IEEE Transactions on Communications,2018,67(3):2527-2538. |
[59] | Mbacke A A,Mitton N,Rivano H.A survey of RFID readers anticollision protocols[J].IEEE Journal of Radio Frequency Identification,2018,2(1):38-48. |
[60] | Rahman F, Ahamed S I.Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols[J].Personal and Ubiquitous Computing,2014,18(1):177-188. |
[61] | Yue K Q,Sun L L,Qin Y,et al.Design of anti-collision integrated security mechanism based on chaotic sequence in UHF RFID system[J].China Communication,2014,11:137-147. |
[62] | Li Peng,Zheng Tian-tian,Xu He,et al.RFID security authentication protocol based on blockchain technology[J].Netinfo Security,2021,21(5):1-11.(in Chinese) |
[63] | Sidorov M,Ong M,Sridharan R,et al.Ultralight-weight mutual authentication RFID protocol for blockchain enabled supply chains[J].IEEE Access,2019,19(7):7273-7285. |
[64] | Jangirala S,Das A,Vasilakos A.Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment[J].IEEE Transactions on Industrial Informatics,2019,16(11):7081-7093. |
附中文参考文献: | |
[2] | 周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):4581-4589. |
[7] | 汪亚,魏国珩,魏巍.面向RFID应用的轻量级加密算法分类模型研究[J].计算机与数字工程,2017,45(6):1150-1155. |
[8] | 汪亚,魏国珩.适用于RFID的轻量级密码算法研究综述[J].计算机应用与软件,2017,34(1):9-14. |
[62] | 李鹏,郑田甜,徐鹤,等.基于区块链技术的RFID安全认证协议[J].信息网络安全,2021,21(5):1-11. |
[1] | 郎晓丽,曹素珍,刘祥震,张玉磊,王斐. 具有高效授权的无证书公钥认证可搜索加密方案[J]. 计算机工程与科学, 2020, 42(03): 418-426. |
[2] | 靳朋1,郗涛1,王莉静2. 基于二次加权的LANDMARC景区改进定位算法研究[J]. 计算机工程与科学, 2019, 41(03): 485-489. |
[3] | 钟小妹,肖美华,李伟,谌佳,李娅楠. RFID超轻量级认证协议RCIA形式化分析与改进[J]. 计算机工程与科学, 2018, 40(12): 2183-2192. |
[4] | 尹强,佐磊,何怡刚,刘东洋,李亚. 基于支持向量回归机的RFID室内定位研究[J]. 计算机工程与科学, 2017, 39(12): 2340-2344. |
[5] | 肖红光1,李为1,巫小蓉2. 基于同步数的轻量级高效RFID身份认证协议[J]. J4, 2016, 38(04): 673-678. |
[6] | 曹洁1,2,牛丽波1,王进花1. 一种改进LANDMARC射频识别室内定位算法[J]. J4, 2015, 37(09): 1671-1675. |
[7] | 王桂超,王彦,李永珍. 基于RBAC的RFID安全认证协议[J]. J4, 2014, 36(05): 874-878. |
[8] | 温佩芝1,苏亭婷1,李丽芳1,张建军2. 基于粒子群的射频识别定位算法[J]. J4, 2014, 36(05): 917-922. |
[9] | 吴彦文,舒武静,王贵才. 基于射频识别的运动能耗信息采集系统的研究[J]. J4, 2013, 35(8): 180-184. |
[10] | 李华,李敏波,顾晟曦. 面向企业应用的RFID集成中间件框架[J]. J4, 2012, 34(1): 111-118. |
[11] | 陈丽芳,刘渊. 基于RFID技术的城市交通信号优化控制[J]. J4, 2011, 33(6): 178-181. |
[12] | 王进1,易灵芝1,王根平2. 新型Q值防碰撞算法在RFID系统中的研究[J]. J4, 2011, 33(6): 182-185. |
[13] | 李珍香,李国,张宇翔. 基于ARM的嵌入式RFID中间件设计与实现[J]. J4, 2011, 33(5): 116-120. |
[14] | 康庄庄,陈〓群,孙林超. 分布式RFID复杂事件处理技术的研究[J]. J4, 2011, 33(12): 136-142. |
[15] | 刘敏,李战怀,陈群. 智能超市中在线与离线RFID数据仓库技术研究[J]. J4, 2011, 33(11): 171-176. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
湘公网安备 43010502000083号
湘ICP备10006030号
版权所有 © 《计算机工程与科学》 编辑部
地址:中国湖南省长沙市开福区德雅路109号(410073) 电话:0731-87002567 Email: jsjgcykx@vip.163.com
本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn