南京大学学报(自然科学版) ›› 2019, Vol. 55 ›› Issue (3): 458469.doi: 10.13232/j.cnki.jnju.2019.03.013
张霄涵1,2,胡红钢1,2*
Zhang Xiaohan1,2,Hu Honggang1,2*
摘要: 随着物联网技术的不断发展,RFID(Radio Frequency Identification)技术越来越受到人们的重视. 然而,快速发展的应用场景导致传统RFID双向认证协议的安全性假设不再成立. 不仅如此,随着物联网规模的不断扩大,传统的中心化RFID认证架构的弊端也逐渐凸显出来. 区块链技术具有去中心化和拜占庭容错的特点,可以同时有效地解决上述问题,但其效率十分低下. 区块格是区块链技术中的一种有向无环图结构,具有并行处理交易的特点,可以提高执行效率,但因受限于共识机制,仍有吞吐量瓶颈. 首先分析了恶意阅读器的可能行为,设计了适用于本场景的容忍分叉的区块格结构,并证明了其仍然具有偏序关系;然后结合传统的RFID双向认证协议,设计了基于区块格的RFID双向认证协议,所提出的协议在安全性不受影响的前提下去除了共识机制,消除了吞吐量瓶颈;最后,对所提出的协议的效率进行了分析,结果显示本协议在保证安全性的前提下具有在渐进意义上与传统协议采用的中心化架构一致的效率.
中图分类号:
[1] 杨 冰. 基于Hash函数的RFID身份认证协议研究. 硕士学位论文. 西安:西安工业大学,2018.(Yang B. Research of RFID identity authentication protocol based on hash function. Master Dissertation. Xi’an:Xi'an Technological University,2018.) [2] 陈萌萌,董庆宽,李璐璐. 基于云的RFID相互认证协议. 密码学报,2018,5(3):231-241.(Chen M M,Dong Q K,Li L L. Cloud-based RFID mutual authentication protocol. Journal of Cryptologic Research,2018,5(3):231-241.) [3] Niu B,Zhu X Y,Chi H T,et al. Privacy and authentication protocol for mobile RFID systems. Wireless Personal Communications,2014,77(3):1713-1731. [4] 苏 彬,程 玲,崔宝江. 适用于低成本标签的移动RFID认证协议. 计算机工程与应用,2018,54(16):68-75.(Su B,Cheng L,Cui B J. Mobile RFID authentication protocol for low-cost tags. Computer Engineering and Applications,2018,54(16):68-75.) [5] Lin I C,Hsu H H,Cheng C Y. A cloud-based authentication protocol for RFID supply chain systems. Journal of Network and Systems Management,2015,23(4):978-997. [6] Rhee K,Kwak J,Kim S,et al. Challenge-response based RFID authentication protocol for distributed database environment ∥ Hutter D,Ullmann M. International Conference on Security in Pervasive Computing. Springer Berlin Heidelberg,2005:70-84. [7] Mtita C,Laurent M,Delort J. Efficient serverless radio-frequency identification mutual authentica-tion and secure tag search protocols with untrusted readers. IET Information Security,2016,10(5):262-271. [8] Hammi M T,Hammi B,Bellot P,et al. Bubbles of Trust:A decentralized blockchain-based authentication system for IoT. Computers & Security,2018,78:126-142. [9] Lee C H,Kim K H. Implementation of IoT system using block chain with authentication and data protection ∥ 2018 International Conference on Information Networking(ICOIN). Chiang Mai,Thailand:IEEE,2018:936-940. [10] Wüst K,Gervais A. Do you need a Blockchain? ∥ 2018 Crypto Valley Conference on Blockchain Technology(CVCBT). Zug,Switzerland:IEEE,2018:45-54. [11] Popov S. The tangle. IOTA. http://www.descryptions.com/Iota.pdf,2018-04-30. [12] Churyumov A. Byteball:A decentralized system for storage and transfer of value. Byteball. https://byteball.org/Byteball.pdf,2016-09-05. [13] LeMahieu C. Nano:A feeless distributed cryptocurrency network. http://nano.org/en/whitepaper,2019-01-30. [14] Liu C M,Wang D,Wu M. Vite:A high performance asynchronous decentralized application platform. https://github.com/vitelabs/whitepaper/blob/master/vite_en.pdf,2018-06-20. [15] Wu F,Xu L L,Kumari S,et al. A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. Journal of Ambient Intelligence and Humanized Computing,2018,9(4):919-930. [16] Srivastava K,Awasthi A K,Kaul S D,et al. A hash based mutual RFID tag authentication protocol in telecare medicine information system. Journal of Medical Systems,2015,39(1):153. [17] Li C T,Weng C Y,Lee C C. A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system. Journal of Medical Systems,2015,39(8):77. [18] Masdari M,Ahmadzadeh S. A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems. Journal of Network and Computer Applications,2017,87:1-19. |
No related articles found! |
|