期刊文献+

基于Hash函数的RFID双向认证协议

Hash-based RFID mutual authentication protocol
在线阅读 下载PDF
导出
摘要 资源有限,在开放环境中广播信号使得射频识别(RFID)系统存在安全缺陷.在现有的RFID认证协议基础上,基于Hash函数的单调性和不可替换性,提出了一种改进的双向认证协议.改进的协议可以很好地协调安全、高效以及成本问题,在有效避免窃听、追踪、重放等安全威胁上优势明显. RFID system has many security problems because of limited resource and broadcasting information in an open environment. An improved mutual authentication protocol is put forward in this paper based on existing RFID protocol and Hash function. The protocol can effectively solve the security attacks, such as illegal access, masquerade, etc. It has advantages in balancing the security, efficiency and cost.
出处 《西南民族大学学报(自然科学版)》 CAS 2012年第6期969-972,共4页 Journal of Southwest Minzu University(Natural Science Edition)
基金 教育部社科基金(12YJAZH004) 中央高校基本科研业务费专项资金(11NZYTH06 12NZYQN15)
关键词 RFID 标签 阅读器 认证 HASH函数 RFID tag reader authentication Hash function
  • 相关文献

参考文献6

  • 1SARMA S, WEIS S, ENGELS D. RFIDsystems and security and privacy implications[C]. Proc Of CHES'02 Springer,2002:454-469.
  • 2WEIS S, SARMA S, RIVEST R. Security and privacy aspects of low-cost radio frequency identification systems[C]. Proc of Security in pervasive Computing'04,2004:201-212.
  • 3OHKUBO M, SUZUKI K, KINOSHITA S. Cryptographic approach to privacy-friendly tags[C]. Proc of RFID Privacy Workshop, USA MIT,2003.
  • 4WILLIAMSTALLINGS.NetworkSecurityEssentials—applicationsandstandards[M].北京:清华大学出版社,2007.
  • 5丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592. 被引量:93
  • 6谢川.结合Hash函数和密钥阵列的RFID安全认证协议[J].计算机应用,2011,31(3):805-807. 被引量:8

二级参考文献44

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170

共引文献97

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部