期刊文献+

轻量级RFID系统的认证协议研究 被引量:3

Study on Authentication Protocol for Lightweight RFID System
原文传递
导出
摘要 由于标签强大的追踪能力,无线射频识别(RFID,Radio Frequency Identification)技术越来越多地被应用到与安全相关的各个领域,从而对安全功能的要求也随之提高。针对轻量级RFID标签在使用中的安全问题,对现有的认证协议潜在的危险进行了深入的分析,在此基础上提出了一种基于流密码的认证协议。在此安全协议中,标签和阅读器之间进行多次的双向认证,可以确保通信双方的合法性;并充分考虑了在实际应用中,标签的低成本要求。 Owing to the labels' powerful traceability,Radio Frequency Identification(RFID) technology is increasingly applied to security-related fields,thus enhancing the security functional requirements.For safety of the Lightweight RFID tags in use,the potential dangers of the existing authentication protocols are analyzed in detail,and based on this,a stream cipher-based password authentication protocol is proposed,in which multi-time two-way authentications between the tags and readers are implemented,thus to ensure the legality of the communicating parties.Meanwhile,the low-cost labeling requirements in practical applications are also comprehensively considered.
机构地区 贵州大学
出处 《通信技术》 2012年第2期29-31,共3页 Communications Technology
关键词 无线射频识别 认证协议 流密码 RFID authentication protocol stream cipher
  • 相关文献

参考文献7

二级参考文献68

  • 1黎立,朱清新,王芳.EPC系统中的中间件研究[J].计算机工程与设计,2006,27(18):3360-3363. 被引量:19
  • 2Hopper N J and Blum M. Secure human identification protocols. In Advances in Cryptology ASIA CRYPT'01, vol. 2248 of Lecture Notes in Computer Science, 2001: 52-66.
  • 3Juels A and Weis S. Authenticating pervasive devices with human protocols. In Advances in Cryptology -CRYPTO'05, vol.3621 of Lecture Notes in Computer Science, 2005: 293-308.
  • 4Bringer J, Chabanne H, and Dottax E. HB^++: a lightweight authentication protocol secure against some attacks. IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in pervasive and Ubiquitous Computing SecPerU, 2006: 28-33.
  • 5Selwyn P. HB and related lightweight authentication protocols for secure RFID Tag/Reader authentication. CollECTeR Europe Conference, Basel, Switzerland, June 2006.
  • 6Crawford J M, Kearns M J, and Shapire R E. The minimal disagreement parity problem as a hard satisfiability problem. Tech. rep., Computational Intelligence Research Laboratory and AT&T Bell Labs, February 1994.
  • 7Berlekamp E R, McEliece R J, and Tilborg V. On the inherent intractability of certain coding problems. IEEE Trans. on Information Theory, 1978, 24(3): 384-386.
  • 8Blum A, Furst M, Kearns M, and Lipton R J. Cryptographic primitives based on hard learning problems. In Advances in Cryptology----CRYPTO'93, Vol.773 of Lecture Notes in Computer Science, 1993: 278-291.
  • 9HAstad J. Some optimal inapproximability results. In Symposium on Theory of Computing, El paso, Texas, Unitied States, 1997, Vol 48: 1-10.
  • 10Kearns M. Efficient noise-tolerant learning from statistical queries. Journal of the ACM, 1998, 45(6): 983-1006.

共引文献58

同被引文献12

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部