南京大学学报(自然科学版) ›› 2019, Vol. 55 ›› Issue (3): 458–469.doi: 10.13232/j.cnki.jnju.2019.03.013

• • 上一篇    下一篇

基于区块格的RFID双向认证协议

张霄涵1,2,胡红钢1,2*   

  1. 1. 中国科学技术大学信息科学技术学院,合肥,230027; 2. 中国科学院电磁空间信息重点实验室,合肥,230027;
  • 收稿日期:2019-02-03 出版日期:2019-06-01 发布日期:2019-05-31
  • 通讯作者: 胡红钢 E-mail:hghu2005@ustc.edu.cn
  • 基金资助:
    国家自然科学基金(61522210)

RFID mutual authentication protocol based on block lattice

Zhang Xiaohan1,2,Hu Honggang1,2*   

  1. 1. School of Information Science and Technology,University of Science and Technology of China,Hefei,230027,China; 2. Key Laboratory of Electromagnetic Space Information,Chinese Acadamy of Science,Hefei,230027,China;
  • Received:2019-02-03 Online:2019-06-01 Published:2019-05-31
  • Contact: Hu Honggang E-mail:hghu2005@ustc.edu.cn

摘要: 随着物联网技术的不断发展,RFID(Radio Frequency Identification)技术越来越受到人们的重视. 然而,快速发展的应用场景导致传统RFID双向认证协议的安全性假设不再成立. 不仅如此,随着物联网规模的不断扩大,传统的中心化RFID认证架构的弊端也逐渐凸显出来. 区块链技术具有去中心化和拜占庭容错的特点,可以同时有效地解决上述问题,但其效率十分低下. 区块格是区块链技术中的一种有向无环图结构,具有并行处理交易的特点,可以提高执行效率,但因受限于共识机制,仍有吞吐量瓶颈. 首先分析了恶意阅读器的可能行为,设计了适用于本场景的容忍分叉的区块格结构,并证明了其仍然具有偏序关系;然后结合传统的RFID双向认证协议,设计了基于区块格的RFID双向认证协议,所提出的协议在安全性不受影响的前提下去除了共识机制,消除了吞吐量瓶颈;最后,对所提出的协议的效率进行了分析,结果显示本协议在保证安全性的前提下具有在渐进意义上与传统协议采用的中心化架构一致的效率.

关键词: 区块格, RFID, 双向认证协议, 去中心化

Abstract: With the continuous development of Internet of Things technology,Radio Frequency Identification(RFID)technology has received more and more attention all over the world. However,the rapidly developing application scenarios have led to the security assumptions of traditional RFID mutual authentication protocols no longer hold. Besides,as the scale of the Internet of Things expands,the drawbacks of the traditional centralized RFID authentication architecture have gradually emerged. The blockchain technology has the characteristics of decentralization and Byzantine fault tolerance. Because of that,it can effectively solve the above problems at the same time,but its efficiency is unacceptable. Block lattice is a directed acyclic graph structure in the blockchain technology. It can process transactions in parallel which leads to the improvement of efficiency. However,due to the limitation of the consensus mechanism,block lattice still has a throughput bottleneck,and cannot meet the requirements of the RFID authentication system. In order to solve this problem,we first analyze the behavior of the malicious reader and propose the fork-tolerant block lattice which is suitable for this scenario. Then,we prove that the proposed block lattice still remains a partially ordered set. After that,by taking the advantages of the traditional RFID mutual protocol,we design a new RFID mutual authentication protocol based on the proposed block lattice. The throughput bottlenecks are eliminated from the proposed protocol by removing the consensus mechanism,and this paper explains that the security of the protocol is not affected despite that. Finally,we analyze the efficiency of the proposed protocol,and the results show that the protocol has the same efficiency as the centralized structure used in traditional RFID mutual authentication protocol on the premise of ensuring security.

Key words: block lattice, RFID, mutual authentication protocol, decentralization

中图分类号: 

  • TP309.2
[1] 杨 冰. 基于Hash函数的RFID身份认证协议研究. 硕士学位论文. 西安:西安工业大学,2018.(Yang B. Research of RFID identity authentication protocol based on hash function. Master Dissertation. Xi’an:Xi'an Technological University,2018.)
[2] 陈萌萌,董庆宽,李璐璐. 基于云的RFID相互认证协议. 密码学报,2018,5(3):231-241.(Chen M M,Dong Q K,Li L L. Cloud-based RFID mutual authentication protocol. Journal of Cryptologic Research,2018,5(3):231-241.)
[3] Niu B,Zhu X Y,Chi H T,et al. Privacy and authentication protocol for mobile RFID systems. Wireless Personal Communications,2014,77(3):1713-1731.
[4] 苏 彬,程 玲,崔宝江. 适用于低成本标签的移动RFID认证协议. 计算机工程与应用,2018,54(16):68-75.(Su B,Cheng L,Cui B J. Mobile RFID authentication protocol for low-cost tags. Computer Engineering and Applications,2018,54(16):68-75.)
[5] Lin I C,Hsu H H,Cheng C Y. A cloud-based authentication protocol for RFID supply chain systems. Journal of Network and Systems Management,2015,23(4):978-997.
[6] Rhee K,Kwak J,Kim S,et al. Challenge-response based RFID authentication protocol for distributed database environment ∥ Hutter D,Ullmann M. International Conference on Security in Pervasive Computing. Springer Berlin Heidelberg,2005:70-84.
[7] Mtita C,Laurent M,Delort J. Efficient serverless radio-frequency identification mutual authentica-tion and secure tag search protocols with untrusted readers. IET Information Security,2016,10(5):262-271.
[8] Hammi M T,Hammi B,Bellot P,et al. Bubbles of Trust:A decentralized blockchain-based authentication system for IoT. Computers & Security,2018,78:126-142.
[9] Lee C H,Kim K H. Implementation of IoT system using block chain with authentication and data protection ∥ 2018 International Conference on Information Networking(ICOIN). Chiang Mai,Thailand:IEEE,2018:936-940.
[10] Wüst K,Gervais A. Do you need a Blockchain? ∥ 2018 Crypto Valley Conference on Blockchain Technology(CVCBT). Zug,Switzerland:IEEE,2018:45-54.
[11] Popov S. The tangle. IOTA. http://www.descryptions.com/Iota.pdf,2018-04-30.
[12] Churyumov A. Byteball:A decentralized system for storage and transfer of value. Byteball. https://byteball.org/Byteball.pdf,2016-09-05.
[13] LeMahieu C. Nano:A feeless distributed cryptocurrency network. http://nano.org/en/whitepaper,2019-01-30.
[14] Liu C M,Wang D,Wu M. Vite:A high performance asynchronous decentralized application platform. https://github.com/vitelabs/whitepaper/blob/master/vite_en.pdf,2018-06-20.
[15] Wu F,Xu L L,Kumari S,et al. A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. Journal of Ambient Intelligence and Humanized Computing,2018,9(4):919-930.
[16] Srivastava K,Awasthi A K,Kaul S D,et al. A hash based mutual RFID tag authentication protocol in telecare medicine information system. Journal of Medical Systems,2015,39(1):153.
[17] Li C T,Weng C Y,Lee C C. A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system. Journal of Medical Systems,2015,39(8):77.
[18] Masdari M,Ahmadzadeh S. A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems. Journal of Network and Computer Applications,2017,87:1-19.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 阚建飞, 任永峰, 翟继友, 董学育, 霍 瑛. 基于稀疏模型和Gabor小波字典的跟踪算法[J]. 南京大学学报(自然科学版), 2019, 55(1): 85 -91 .
[2] 汪洋,陈泰格,陆晓凡,辛小燕,王坤,李茗,青钊,张英为,严晓敏,吴超,言方荣,张冰. COVID⁃19的临床和影像特征与试行指南的映证分析[J]. 南京大学学报(自然科学版), 2020, 56(3): 430 -436 .