期刊文献+

基于多证明者交互证明模型的RFID安全协议的研究 被引量:4

Research of Security Authentication Protocol of the RFID Based on the Multi-prover Model
在线阅读 下载PDF
导出
摘要 RFID技术因其操作便捷等优点在当今得到广泛的应用,但是由于其安全模型的缺陷,使得RFID技术在高安全需求的领域仍未得到应用。提出了一个改进的适用于RFID的多证明者交互证明模型,其相对于单证明者交互模型具有更高的安全性。在此模型的基础上进一步提出了一个适用于分布式RFID环境的基于椭圆曲线门限秘密共享方案的RFID安全协议。经理论分析证明,该协议可以较好地解决克隆攻击、重传攻击、标签跟踪等几种常见的RFID安全问题。 RFID technology is widely used in today's society.However,due to the shortcomings of its security model,RFID technology is still not applied in some areas very well.We proposed a new RFID security model-RFID multi-provermodel.It can compensate for deficiencies in the original model.We also proposed a security protocol based on this model.It can solve many RFID security problems,such as cloning attack,replay attack,tag tracking,and etc.
出处 《计算机科学》 CSCD 北大核心 2011年第5期74-78,共5页 Computer Science
基金 国家自然科学基金(60803148)资助
关键词 RFID 安全模型 身份认证 安全协议 RFID Security model Identification authentication Security protocol
  • 相关文献

参考文献18

  • 1Thornton F, Haines B, Das A M, et al. RFIDSecurity [M]. Canada: Andrew Williams, 2006 : 69- 71.
  • 2Shamir A. How to Share a Secret [J]. Communication of Association for Computing Machinery, 1979,22(11 ) :612 -613.
  • 3周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 4Juels A,Rivest R,Szydlo M. The blocker tag: Selective blocking of RF1D tags for consumer privacy [C]//Proc of the 8th ACM Conf on Computer and Comm Security. New York: ACM, 2003: 103-111.
  • 5Sarma S,Weis S,Engels D. RFID systems and security and privacy implications[C]//Proc of the 4th Int Workshop on Cryp tographic Hardware and Embedded Systems. Berlin: Springer, 2002 : 454-469.
  • 6Weis S A,Sarma S E,Rivest R I.,et al. Security and privacy as pects of low-cost radio frequency identification systems[C]// Proc of the 1st Security in Pervasive Computing. Berlin.. Springer, 2003 :201-212.
  • 7Henrici D, Mauller P. Hash based enhancement of location privacy for radio-requency identification devices using varying iden tifiers [C]//Proe of the 2nd IEEE Annual Conf on Pervasive Computing and Communications Workshops. Los Alamitos,CA: IEEE Computer Society, 2004.
  • 8Juels A,Pappu R. Squealing euros: Privacy protection in RFID-enabled banknotes [C]//Proc of the Financial Cryptography. Berlin: Springer, 2003 : 103- 121.
  • 9Lee Y-C, Hsieh Y-C, You P-S, et al. A New Uhralightweight RFID Protocol with Mutual Authentication [C] //Proc. of WASE09. Volume 2. ICIE. 3009:58 -61.
  • 10Burmester M, Van Le, De Medeiros T, et al. Universally composable RFID identification and authentication protocols [J]. ACM Trans. Inf. Syst. Secur,2009,12(4) : 21-33.

二级参考文献64

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170

共引文献272

同被引文献81

  • 1薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:62
  • 2张玉清,莫燕,吴建耀.安全协议的建模与分析:CSP方式[M].北京:机械工业出版社,2005:70-71.
  • 3Curtin J,Kauffman R J,Riggins F J.Making the "MOST" ottt of RFID technology:A research agenda for the study of the adoption, usage, and impact of RFID[J].Information Technology and Management,2007, 8(2):87-110.
  • 4Wang Y M,Wang Y S,Yang Y F.Understanding the determinants of RF1D adoption in the manufacturing industry[J].Technalogical Fare- casting and Social Change,2010,77:803-815.
  • 5Asif Z,Mandviwalla M.Integrating the supply chain with RFID: A technical and business analysis[J].Communications of the Association for Information Systems,2005,15 (24):393-426.
  • 6Alp Ustundag.Fuzzy rule-based system for the economic analysis of RFID investments[J].Expert Systems with Applications,2010,37:5 300- 5 306.
  • 7Landt J.The history of RFID[J]. IEEE Potentials, 2005,24(4):8-11.
  • 8Hussain Saleem.Review of Various Aspects of Radio Frequency lDen-tification (RF1D) Technology[J].Journal of Computer Engineering, 2012, 8(1):1-6.
  • 9Konstantinos Domdouzis.Radio-Frequency Identi-cation (RFID) appli- cations:A brief introduction[J].Advanced Engineering lnformatics, 2007,(21): 350-355.
  • 10Brown l,Russell J.Radio frequency identi-cation technology: An ex- ploratory study on adoption in the South African retail sector[J]. Inter- national Journal of Information Management, 2007,27:250-265.

引证文献4

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部