期刊文献+

基于EPC-C1G2标准的RFID认证机制 被引量:5

RFID Authentication Scheme Based on EPC-C1G2 Standard
在线阅读 下载PDF
导出
摘要 分析EPC-C1G2标准认证机制和现有改进方案,针对超高频射频识别(RFID)认证机制存在的安全缺陷,提出一种轻量级RFID认证方案。该方案实现了读写器和标签的双向认证,其轻量级加密算法能在一定程度上保证消息的安全传输。分析结果表明该方案具有较高安全性,能满足超高频RFID的安全需求。 This paper analyzes the standard authentication mechanism of EPC-C 1G2 protocol and existing improved schemes. A lightweight RFID authentication scheme is proposed according to the security problem of existing UHF RFID authentication schemes. The mutual authentication between reader and tag can be achieved in the scheme, and the lightweight encryption algorithm of the scheme can guarantee that the transmission of messages is secure. Analysis results show that the scheme has good security performance and can meet the security requirements of UHF RFID.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第18期153-154,157,共3页 Computer Engineering
关键词 超高频 射频识别 认证 安全传输 UHF RFID authentication security transmission
  • 相关文献

参考文献7

  • 1Karthikeyan S,Nesterenko M.RFID Security Without Extensive Cryptography[C] //Proc.of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks.Alexandria,VA,USA:ACM Press,2005:63-67.
  • 2Radio-frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz ~ 960 MHz Version 1.0.9.[Z].EPC.2005.
  • 3Duc D N,Park J,Lee Hyunrok,et al.Enhancing Security of EPCglobal GEN-2 RFID Tag Against Traceability and Cloning[C] //Proc.of the 2006 Symposium on Cryptography and Information Security.Beijing,China:[s.n.] ,2006.
  • 4Chien Hungyu,Chen Chehao.Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards[J].Computer Standards & Interfaces,2007,29(2):254-259.
  • 5Konidala D M,Kim K.RFID Tag-Reader Mutual Authentication Scheme Utilizing Tag's Access Password[Z].Auto-ID Labs White Paper,2007.
  • 6Konidala D M,Kim Z,Kim K.A Simple and Cost-effective RFID Tag-reader Mutual Authentication Scheme[C] //Proc.of RFIDSec'07.Malaga,Spain:[s.n.] ,2007:141-152.
  • 7Chien Hungyu.SASI:A New Ultra Light Weight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity[J].IEEE Transactions on Dependable and Secure Computing,2007,4(4):337-340.

同被引文献25

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 2López P P. Lightweight Cryptography in Radio Frequency Identification(RFID) Systems[D]. Madrid, Spain: Universidad Carlos III de Madrid, 2008.
  • 3ISO/IEC. 18000-3:2008 Information Technology——Radio Frequ- ency Identification for Item Management[S]. 2008.
  • 4Sarma S E, Weis S A, Engels D W. RFID Systems, Security and Privacy Implications[R]. AutoID Center, Massachusetts Institute of Technology, Tech. Rep.: MIT-AUTOID-WH-014, 2002.
  • 5Juels A, Rivest R L, Szydlo M. The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy[C]//Proceedings of the 10th ACM Conference on Computer and Communications Security. Washington D. C., USA: ACM Press, 2003.
  • 6Pappu R, Recht B, Taylor J, et al. Physical One-way Functions[J]. Science, 2002, 297(5589): 2026-2030.
  • 7Yuan Honglin, Hu Aiqun. Preamble-based Detection of Wi-Fi Transmitter RF Fingerprints[J]. Electronics Letters, 2010, 46(16): 1165-1167.
  • 8Saparkhojayev N, Thompson D R. Matching Electronic Finger- prints of RFID Tags Using the Hotelling's Algorithm[C]//Proc. of Sensors Applications Symposium. New Orleans, USA: IEEE Press, 2009: 19-24.
  • 9Kyouwoong K, Spooner C M, Akbar I, et al. Specific Emitter Identification for Cognitive Radio with Application to IEEE 802.11[C]//Proc. of Global Telecommunications Conference. New Orleans, USA: IEEE Press, 2008: 1-5.
  • 10Ari J.RFID Security and Privacy:A Research Survey[J].IEEEJournal on Selected Areas in Communications,2006,24(2):381-394.

引证文献5

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部