信息网络安全 ›› 2020, Vol. 20 ›› Issue (6): 26-35.doi: 10.3969/j.issn.1671-1122.2020.06.004

• 技术研究 • 上一篇    下一篇

大规模移动RFID系统Shamir’s密钥共享PUF安全认证协议

孙子文1,2(), 张向阳1   

  1. 1.江南大学物联网工程学院,无锡 214122
    2.江南大学物联网技术应用教育部工程研究中心,无锡 214122
  • 收稿日期:2020-02-21 出版日期:2020-06-10 发布日期:2020-10-21
  • 通讯作者: 孙子文 E-mail:sunziwen@jiangnan.edu.cn
  • 作者简介:孙子文(1968—),女,江苏,教授,博士,主要研究方向为无线传感网络理论与技术、信息安全等|张向阳(1995—),女,安徽,硕士研究生,主要研究方向为信息安全
  • 基金资助:
    国家自然科学基金(61373126);江苏省自然科学基金(BK20131107);中央高校基本科研业务费专项资金(JUSRP51310A)

Large-scale Mobile RFID System Shamir’s Key Sharing PUF Security Authentication Protocol

SUN Ziwen1,2(), ZHANG Xiangyang1   

  1. 1. School of Internet of Things Engineering, Jiangnan University, Wuxi 214122, China
    2. Engineering Research Center of Internet of Things Technology Applications of Ministry of Education, Jiangnan University, Wuxi 214122, China
  • Received:2020-02-21 Online:2020-06-10 Published:2020-10-21
  • Contact: SUN Ziwen E-mail:sunziwen@jiangnan.edu.cn

摘要:

针对大规模移动无线射频识别(RFID)系统多样且存在严重的安全隐患问题,文章研究了一种Shamir’s密钥共享安全认证协议。该协议采用物理不可克隆函数(PUF)两步生成会话密钥机制,可避免标签和读写器遭受物理入侵带来的假冒攻击;服务器端对读写器合法性进行认证,以适用于移动RFID系统的应用场景;采用时间戳阈值与更新机制抵御重放攻击;采用Shamir’s密钥共享方案,降低服务器搜索计算开销,适用于大规模RFID系统。文章改进Vaudenay模型预假设,对认证协议进行安全和隐私性分析证明,结果表明,该协议可抵抗多种攻击。使用C#语言对服务器认证耗时进行对比实验,结果表明,该协议服务器认证耗时较其他协议具有明显优势,能够满足大规模移动RFID系统的应用要求。

关键词: RFID, PUF, 安全认证协议, Shamir’s密钥共享, Vaudenay模型

Abstract:

Aiming at the diverse and serious security risks of large-scale mobile RFID systems, a Shamir’s key sharing scheme security authentication protocol is studied. The two-step session key generation mechanism based on PUF can avoid the counterfeiting attack caused by physical intrusion on tags and readers. The server authenticates the legality of the reader to comply the application scenario of the mobile RFID system. The timestamp threshold and update mechanism are used to defend against replay attacks. To meet the requirements of large-scale RFID systems, Shamir’s key sharing scheme is adopted to reduce the computational overhead of server search. The improved Vaudenay model is used to prove the security and privacy of the authentication protocol, the results show that the protocol can resist multiple attacks. Using C# to simulate the time-consuming of server authentication, the results show that the time spent on protocol server authentication in this paper has obvious advantages over other protocols, which meets the application requirements of large-scale mobile RFID systems.

Key words: RFID, PUF, security authentication protocol, Shamir’s key sharing, Vaudenay model

中图分类号: