信息网络安全 ›› 2020, Vol. 20 ›› Issue (8): 89-97.doi: 10.3969/j.issn.1671-1122.2020.08.011

• 理论研究 • 上一篇    下一篇

基于PUF的抗物理克隆RFID安全认证协议

王利1, 李二霞1, 纪宇晨2, 李小勇2()   

  1. 1.中国电力科学研究院有限公司,北京 100192
    2.北京邮电大学可信分布式计算与服务教育部重点实验室,北京 100876
  • 收稿日期:2020-04-20 出版日期:2020-08-10 发布日期:2020-10-20
  • 通讯作者: 李小勇 E-mail:lixiaoyong@bupt.edu.cn
  • 作者简介:王利(1975—),女,陕西,高级工程师,硕士,主要研究方向为RFID电子标签安全防护及检测、配电技术等|李二霞(1984—),女,山东,高级工程师,硕士,主要研究方向为配电自动化安全防护技术、配电终端智能化与互操作等|纪宇晨(1995—),男,浙江,硕士,主要研究方向为网络空间安全|李小勇(1975—),男,甘肃,教授,博士,主要研究方向为网络安全,可信服务工程
  • 基金资助:
    国家电网有限公司科技项目(PDB17201800158);国家自然科学基金-通用技术基础研究联合基金(U1836215)

PUF-based Anti-physical Cloning RFID Security Authentication Protocol

WANG Li1, LI Erxia1, JI Yuchen2, LI Xiaoyong2()   

  1. 1. China Electric Power Research Institute Corporation, Beijing 100192, China
    2. Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2020-04-20 Online:2020-08-10 Published:2020-10-20
  • Contact: LI Xiaoyong E-mail:lixiaoyong@bupt.edu.cn

摘要:

安全认证协议是解决射频识别(RFID)系统前向信道安全和身份识别问题的重要手段。针对RFID系统标签和读写器通信信道安全性较低以及低成本RFID系统标签容易受到物理攻击和标签克隆攻击的问题,基于物理不可克隆函数(PUF)技术和传统的RFID安全认证协议,文章提出一种基于PUF的抗物理克隆RFID安全认证协议。通过PUF和哈希函数两种密码原语来保证通信安全,协议的所有通信都经过加密,从而保证信息的隐私性和安全性,每一轮认证后更新标签信息和密钥信息从而防止重放攻击。协议性能分析结果表明,文章所提出的安全认证协议不仅能够防范窃听、篡改、重放等攻击,还能够防范物理攻击和标签克隆攻击,提高了RFID系统的安全性;同时不会占用过多资源,能够适用于低成本的资源受限的RFID系统。

关键词: RFID系统, 安全认证协议, 抗物理克隆, 物理不可克隆函数

Abstract:

Security authentication protocol is an important means to solve the forward channel security and identity identification problems of radio frequency identification (RFID) system. In view of the insecure problem of RFID system tags and reader channels and the vulnerability of tags to physical attacks, combining physical unclonable function (PUF) technology with traditional RFID security protocol, a PUF-based anti-physical cloning RFID protocol is proposed. The communication primitives are guaranteed by the two cryptographic primitives PUF and hash function, all communication of the protocol is encrypted to ensure the exclusiveness and security of the information, and the label information and the key information are updated after each round of authentication. The analysis results of protocol performance show that, the proposed protocol can prevent not only eavesdropping, tampering, replay attacks, but also physical attacks and tag clone attacks, thus improving the security of RFID system. At the same time, the proposed protocol does not take up too much resources and can be applied to low-cost resource-constrained RFID systems.

Key words: RFID system, security authentication protocol, resistance to physical cloning, physical unclonable function

中图分类号: