期刊文献+

一种低成本RFID的双向认证协议 被引量:2

A MUTUAL AUTHENTICATION PROTOCOL FOR LOW-COST RFID
在线阅读 下载PDF
导出
摘要 对低成本RFID(Radio Frequency Identification)系统存在的安全性问题进行了分析,并提出了一种新的安全认证协议。该协议使用散列函数、异或运算及移位运算等常见算法,既解决了安全问题又降低了标签要求。通过在服务器上保存每个标签的新、旧标识,有效地解决了服务器和标签的同步问题,同时能抵御窃听、重放、跟踪、阻断、模拟等多种攻击。通过性能分析,该协议比常用的Duc、CC协议在标签的存储空间和计算能力等方面要求更低,适合低成本标签使用。 This paper analysed the security problem existed in low-cost RFID system, and presented a new security authorization protocol. This protocol uses common algorithms, such as hash function, XOR computation and shift operation, while resolves the security problem, it reduces the requirements of tags as well. It effectively tackles the synchronous problem between the server and tags by storing new and old identifiers of every tag in the server. At the same time it can resist eavesdropping, replay, track, block, simulation and other attacks. Through the performances analysis, this protocol has less memory and computing ability requirement compared with the common protocols such as Duc and CC, and is suitable for the low-cost tag' s environment.
作者 杨灵 陈志强
出处 《计算机应用与软件》 CSCD 2010年第8期298-300,共3页 Computer Applications and Software
关键词 双向认证协议 RFID 低成本标签 Mutual authentication protocol RFID Low-cost RFID tags
  • 相关文献

参考文献6

  • 1Ohkubo M,Suzuki K,Kinoshita S.Hash-chain based forward secure privacy protection scheme for low-cost RFID[C]//Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004:719-724.
  • 2Rhee K,Kwak J,Kim S.Challenge-response based RFID authentication protocol for distributed database environment[C]//Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in Computer Science 3450.Berlin:Springer-Verlag,2005:70-84.
  • 3Duc D N,Park J,Lee H,et al.Enhancing security of EPCglobal gen-2 RFID tag against traceability and cloning[C]//Symposium on Cryptography and Information Security-SCIS 2006,Hiroshima,Japan,January 2006.
  • 4Chien H,Chen C.Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards.Computer Standards Interfaces,2007,29(2):254-259.
  • 5周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 6Lehtonen M,Staake T,Michahelles F,et al.From identification to authentication-a review of RFID product authentication techniques[C]//Printed handout of Workshop on RFID Security-RFIDSec 2006,2006.

二级参考文献28

  • 1Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 2Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 3Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 4Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 5Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 6Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 7Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 8Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 9Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
  • 10Saito J,Ryou J.C,Sakurai K..Enhancing privacy of universal re-encryption scheme for RFID tags.In:Yang L.T,Guo M,Gao G.R,Jha N.K.eds..Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2004).Lectures Notes in Computer Science 3207.Berlin:Springer-Verlag,2004,879~890

共引文献214

同被引文献14

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部