دورية أكاديمية

基于切比雪夫混沌映射和 PUF的 RFID 三方认证协议.

التفاصيل البيبلوغرافية
العنوان: 基于切比雪夫混沌映射和 PUF的 RFID 三方认证协议. (Chinese)
Alternate Title: RFID tripartite authentication protocol based on Chebyshev chaos mapping and PUF. (English)
المؤلفون: 徐森, 刘佳鑫, 杨硕, 赵洋
المصدر: Application Research of Computers / Jisuanji Yingyong Yanjiu; Feb2024, Vol. 41 Issue 2, p582-595, 14p
مصطلحات موضوعية: RADIO frequency identification systems, PHYSICAL mobility, LOGIC
Abstract (English): In order to halance the security requirements and resource costs of the three party authentication protocols for radio frequency identification(RFID), this paper proposed a protocol based on Chebyshev chaotic mapping and physical unclonable function(PUF), taking advantage of the semi-gmap property and chaotic property of Chebyshev polynomials. It used Chebyshev chaotic mapping to achieve secret sharing among tags, readers, and servers, and used random numbers to achieve freshness of each session which could resist replay attack, and also to realize the anonymity of readers and tags. It used the PUF function to achieve the authentication of the label and to resist physical cloning attacks. Security analysis shows that this protoenl can effec tively resist various malicious attacks such as tracking, replay, physical cloning, and de-synchronization attacks. Moreover, it verified the security properties of the protocol using formal methods, including BAN Ingie and Scyther tool. Compared with recent studies, this protocol compensates for the security deficiencies of similar RFID protocols, balancing harthcare costs as much as possible while meeting various security attribute requirements, and still fitting the limited hardware resources of RFID. It is suitable for third-party authentication scenarios in RFID. [ABSTRACT FROM AUTHOR]
Abstract (Chinese): 针对射频识别(RFID)三方认证协议存在的安全需求和资源开销的平衡问题,利用切比雪夫多项式的 半群性质以及混沌性质提出了一个基于切比雪夫混沌映射和物理不可克隆函數(PUF)的RFID三方认证协议: 使用切比雪夫混沌映射来实现标签、阅读器和服务器三方共享秘密;使用随机数实现协议每轮会话的新鲜性以 抵抗重救攻击,同时也实现了阅读器与标签的匿名性;使用PUF函數实现标签本身的安全认证以及抵抗物理克 隆攻击安全分析表明,该协议能有效抵抗追踪、重放、物理克隆和去同步攻击等多种恶意攻击,使用BAN 逻辑 分析方法和 Scyther 工具验证了其安全性,与近期协议对比分析表明,该协议弥补了同类RFID 协议的安全缺 陷,在满足各种安全属性需求的同时尽量平衡硬件开销,契合了RFID 硬件资源受限的处境,适用于RFID 三方 认证场景。 [ABSTRACT FROM AUTHOR]
Copyright of Application Research of Computers / Jisuanji Yingyong Yanjiu is the property of Application Research of Computers Edition and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:10013695
DOI:10.19734/j.issn.1001-3695.2023.06.0263