期刊文献+

RFID双向安全认证协议的设计及分析 被引量:2

Design and Analysis of RFID Mutual Authentication Protocol
在线阅读 下载PDF
导出
摘要 针对RFID系统的实际安全需求,利用数学和密码学技术方法,同时考虑交互认证协议的安全性,隐私性和有效性,对RFID系统认证协议进行研究,提出了一个RFID互认证协议。对其进行安全性及性能分析发现,该协议安全性能良好,功能全面,能够保证内容隐私、防止位置跟踪攻击、抵抗重放攻击、防止假冒攻击,并且具有前向安全性。 In order to content with the security requirements of RFID system, the study uses mathematic and cryptography methods to solve these problems. Considering the security, privacy and effectiveness of RFID protocol, the paper researches the authentication protocol of the RFID system and proposes a mutual authentication protocol of RFID. Its safety and performance analysis show that the proposed protocol is relatively good in these aspects. It can prevent many security including contents privacy, location tracing, replay attack, spoofing attack, and also has forward security ability.
作者 张文丽 赵峰
出处 《智能计算机与应用》 2013年第5期91-92,F0003,共3页 Intelligent Computer and Applications
基金 教育部科学技术研究重点项目(212177) 陕西省科技厅自然基金项目(2011JQ1003) 陕西省教育厅科研专项(12JK0973) 陕西理工学院科研项目(SLGKY11-10)
关键词 射频识别 安全 稳私 认证 互认证 RFID Security Privacy Authentication Mutual Authentication
  • 相关文献

参考文献6

二级参考文献41

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 2Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 3Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 4Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 5Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 6Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 7Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 8Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 9Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 10Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121

共引文献228

同被引文献19

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部