STATISTICS

Viewed1363

Downloads812

High-security Lightweight RFID Triple Authentication Protocol Based on PUF
[1]FAN Wenbing,CHANG Zhengtai,AI Lulin,et al.High-security Lightweight RFID Triple Authentication Protocol Based on PUF[J].Journal of Zhengzhou University (Engineering Science),2023,44(02):46-52.[doi:10.13705/j.issn.1671-6833.2023.02.002]
Copy
References:
[1] 范文兵, 李建华, 禹士鹏, 等. RFID 系统数据传输中 CRC 算法 的 分 析 与 实 现 [ J] . 郑 州 大 学 学 报 ( 工 学 版) , 2010, 31(2) : 97-101. 
FAN W B, LI J H, YU S P, et al. Analysis and implementation of CRC in RFID system[ J] . Journal of Zhengzhou University ( Engineering Science) , 2010, 31 ( 2) : 97-101.
 [2] 刘鹏, 张昌宏, 欧庆于. 基于 Hash 函数的移动射频识 别互认证安全协议设计[ J] . 计算机应用, 2013, 33 (5) : 1350-1352. 
LIU P, ZHANG C H, OU Q Y. Authentication protocol of mobile RFID based on Hash function [ J] . Journal of Computer Applications, 2013, 33(5) : 1350-1352.
 [3] 王国伟, 贾宗璞, 彭维平. 基于动态共享密钥的移动 RFID 双向认 证 协 议 [ J] . 电 子 学 报, 2017, 45 ( 3) : 612-618. 
WANG G W, JIA Z P, PENG W P. A mutual authentication protocol of mobile RFID based on dynamic shared-key [J]. Acta Electronica Sinica, 2017, 45(3): 612-618. 
[4] FARASH M S, NAWAZ O, MAHMOOD K, et al. A provably secure RFID authentication protocol based on elliptic curve for healthcare environments [ J] . Journal of Medical Systems, 2016, 40(7) : 165-173. 
[5] XIAO H N, ALSHEHRI A A, CHRISTIANSON B. A cloud-based RFID authentication protocol with insecure communication channels[ C] / / 2016 IEEE Trustcom / BigDataSE / ISPA. Piscataway: IEEE,2016: 332-339.
 [6] CHIEN H Y. SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong 52 郑 州 大 学 学 报 (工 学 版) 2023 年 integrity[ J] . IEEE Transactions on Dependable and Secure Computing, 2007, 4(4) : 337-340. 
[7] TIAN Y, CHEN G L, LI J H. A new ultralightweight RFID authentication protocol with permutation[ J] . IEEE Communications Letters, 2012, 16(5) : 702-705.
 [8] CHIOU S Y, CHANG S Y. An enhanced authentication scheme in mobile RFID system [ J] . Ad Hoc Networks, 2018, 71: 1-13.
 [9] 王利, 李二霞, 纪宇晨, 等. 基于 PUF 的抗物理克隆 RFID 安全 认 证 协 议 [ J] . 信 息 网 络 安 全, 2020, 20 (8) : 89-97. WANG L, LI E X, JI Y C, et al. PUF-based anti-physical cloning RFID security authentication protocol [ J ] . Netinfo Security, 2020, 20(8) : 89-97. [10] 尹魏昕, 贾 咏 哲, 高 艳 松, 等. 物 理 不 可 克 隆 函 数 ( PUF)研究 综 述 [ J ] . 网 络 安 全 技 术 与 应 用, 2018 (6) : 41-42, 54. 
YIN W X, JIA Y Z, GAO Y S, et al. Review of physical unclonable function ( PUF) [ J] . Network Security Technology & Application, 2018(6) : 41-42, 54.
 [11] 李永强, 刘兆伟. 基于区块链的车联网安全信息共享 机制设 计 [ J] . 郑 州 大 学 学 报 ( 工 学 版) , 2022, 43 (1) : 103-110. 
LI Y Q, LIU Z W. Blockchain-based secure data sharing mechanism design in the vehicular networks[ J] . Journal of Zhengzhou University ( Engineering Science) , 2022, 43(1) : 103-110. 
[12] CHANG Z T, SHI S S, SONG B W, et al. Modeling attack resistant arbiter PUF with time-variant obfuscation scheme [ C ] / / 2021 31st International Conference on Field-Programmable Logic and Applications ( FPL) . Piscataway: IEEE,2021: 60-63. 
[13] 周楠楠. RFID 系 统 中 无 源 标 签 的 伪 随 机 数 发 生 器 [D] . 西安: 西安电子科技大学, 2015. 
ZHOU N N. Pseudo random number generators in the passive tags of RFID system[D] . Xi′an: Xidian University, 2015. 
[14] DOSS R, ZHOU W L, YU S. Secure RFID tag ownership transfer based on quadratic residues[ J] . IEEE Transactions on Information Forensics and Security, 2013, 8 (2) : 390-401.
 [15] 杨世平. 安全协议及其 BAN 逻辑分析研究 [ D] . 贵 阳: 贵州大学, 2007. 
YANG S P. Security protocols and its BAN logic analysis [D] . Guiyang: Guizhou University, 2007. 
[16] VIGANÒ L. Automated security protocol analysis with the AVISPA tool [ J] . Electronic Notes in Theoretical Computer Science, 2006, 155: 61-86. 
[17] FAN K, ZHU S S, ZHANG K, et al. A lightweight authentication scheme for cloud-based RFID healthcare systems[ J] . IEEE Net
Similar References:
Memo

-

Last Update: 2023-02-25
Copyright © 2023 Editorial Board of Journal of Zhengzhou University (Engineering Science)