期刊文献+

基于Hash函数的RFID安全认证协议的设计 被引量:5

Design of RFID Authentication Protocol Based on Hash Function
在线阅读 下载PDF
导出
摘要 随着RFID系统应用的不断扩大,RFID的安全问题也越来越受到人们的关注。基于Hash函数的RFID安全协议以其低成本的优势得到了广泛的应用,但其安全性能尚不完善。文章在分析已有的Hash Lock安全协议的基础上,提出了3种基于Hash函数的R FID安全认证协议IHSAP、IHSAP2和IHSAP3。通过对其进行安全性分析和性能评价可知,IHSAP3性能最好,它可以很好地解决了R FID系统中的信息泄露、位置跟踪、假冒攻击、重放攻击等安全与隐私问题。 With the growing application of RFID systems, RFID security issues are also more and more attention. Hash-based RFID security protocol has been widely used with its low-cost, but its safety performance is not perfect. The p2per proposed three kinds of hash-based security authentication protocol based on the analysis of existing security protocols. On the basis of the security and performance evaluation of these protocols, IHSAP3 is the best in performance, it can prevent many security including information leakage, location tracingoreplay attack,etc.
作者 张文丽
出处 《电脑与信息技术》 2012年第2期56-60,共5页 Computer and Information Technology
关键词 射频识别 HASH函数 认证协议 radio frequency identification Hash function authentication protocol
  • 相关文献

参考文献4

二级参考文献14

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 2粟伟,崔喆,王晓京.基于Hash链的RFID隐私增强标签研究[J].计算机应用,2006,26(10):2328-2331. 被引量:6
  • 3曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 4WEISS A, SARMA S E, RIVEST R L, et al. Security and privacy aspects of low-cost radio frequency identification systems[C]. HUTrER D, MULLER G, STEPHAN W, ULLMANN M. eds. Proceedings of the 1st International Conference on Security in Pervasive Computing. Lectures Notes in Computer Science 2802. Berlin: Springer2Verlag, 2004:201-212.
  • 5OHKUBO M, SUZUKI K, KINOSHITA S. Hash-chain based forward-secure privacy protection scheme for lowcost RFID[C]. Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004),Sendai 2004:719-724.
  • 6ISRASENA P. Securing ubiquitous and low 2cost RFID using tiny encryption algorithm[C]. Wireless Pervasive Computing, 2006. 1st International Symposium, 16215 Jan 2006, 124.
  • 7SARMA S E, WEOS S A, ENGELS D W. RFID systems and security and privacy implications[C]. KALISKR B. S., KOC C K, PAAR C. eds. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHES 2002). Lectures Notes in Computer Science 2523. Ber21in: Springer2Verlag, 2003:454-469.
  • 8SARMA S E,WEIS S A,ENGELS D W. Radio frequency identification: Secure risks and challenges[R]. RSA Laboratories Cryptobytes, 2003,6(1):2-9.
  • 9Juels A.RFID Security and Privacy:A Research Survey[J].IEEE Journal on Selected Areas in Communications,2006,24(2).
  • 10Juels A.Privacy and Authentication in Low-Cost RFID tags[Z].[2006-11].http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publi cations/pt-rfid/pt-rfid.pdf.

共引文献9

同被引文献33

  • 1焦占亚,曾永莹,刘海峰.一种基于伽罗瓦域的密码系统[J].计算机工程与应用,2005,41(30):146-148. 被引量:1
  • 2焦占亚,曾永莹,刘海峰.一次一密的密码算法研究[J].西安科技大学学报,2005,25(4):477-480. 被引量:7
  • 3周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 4Yujung Huang, Weicheng Lin, Hunglin Li. Efficient Implementation ofRFID Mutual Authentication Protocol [ J ]. IEEE TRANSACTIONS ONINDUSTRIAL ELECTRONICS, 2012,59(12) :4784-4791.
  • 5Due D N, Lee H, et al. Open issues in RFID security [ C ] //Interna-tional Conference for Internet Technology and Secured Transactions,2009: 1 -5.
  • 6Dimitriou T. RFID security and privacy [ C ] //RFID Security, 2008 :57 -79.
  • 7Sarma S EtWeis S A, Engels D W. RFID Systems and Security and Pri-vacy Implications [ C ]//Proc. of the 4th Intemationl Wrokshop onCryptographic Hardware and Embedded Systems. Berlin, Germany :Springer-VERLAG, 2003 : 454-469.
  • 8Sarma S E, Engels D W. Radio Frenquency Identification : Secrue Risksand Challenges [ J ]. RSA Laboratories Crypto bytes, 2003 ,6( 1 ):2.
  • 9Weis S A,Sarma S E, Rivest R L,et al. Security and Privacy Aspects ofLow-Cost Radio Frenquency Identification Systems [ C ] //Proc. of the1 st International Conference on Security in Pervasive Computing. Ber-lin, Germany; Springer-Verlag,2004:201 -212.
  • 10Ohkubo M, Suzuki K, Kingships S. Hash-Chain Based Forward-SecurePrivacy Protection Scheme for Low-Cost RFID[ C]//Proc. of Symposi-um on Cryptography and Information Security. Sendai,Japan : [ s. n],2004: 719-724.

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部