期刊文献+

轻量级RFID双向通信认证协议优化方案 被引量:14

An Optimal Design to Lighten the Agreement of Bidirectional Identifi cation on RFID
在线阅读 下载PDF
导出
摘要 以轻量级RFID双向通信认证的设计与实现为研究目标,针对目前存在的轻量级RFID算法空白,所有权转移问题难以解决,现有协议未经过实际检验等问题,基于ECC算法机制,开展设计研究,取得了轻量级RFID双向通信认证协议的逻辑设计、源代码编写、硬件调试、上位机软件编写、可靠性测试等成果,可直接投入实际运用。文章从现有RFID安全认证协议出发,精心论证,认真分析,确保每一步认证的安全性,实现了授权访问、双向认证、标签匿名性、可用性,有效地保护了标签和数据库双向安全,满足RFID系统的安全需求。 Treating the design and realization of Lighten the Agreement of Bidirectional Identiifcation on RFID as our study destination, we use the ECC ALG machining as the basement to start this research. The study is developed to solve some important questions which still exist in this field, such as filling the blank space in ALG on RFID, working out the dififculty of the change of the ownership and that the present agreement hasn’t been tested. At present, we have got success of logic project, original code’s development, debugging the hardware, redacting the software and testing the realibility, of which all can be put into practice directly. The positive result is based on current agreement to RFID safety and has made the impower visit, the bidirectional attestation and the mark’s anonymity realized, which can effectively protect the bidirectional safety of the tag and database. Through our serious study and analysis, we believe we have made the whole process reliable. In short, this product can satisfy the safety need of the RFID system.
出处 《信息网络安全》 2014年第2期58-62,共5页 Netinfo Security
基金 国家自然科学基金[61070201]
关键词 射频识别 轻量级 双向认证协议 加密 RFID light agreement of bidirectional identiifcation encryption
  • 相关文献

参考文献18

二级参考文献131

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170

共引文献473

同被引文献183

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:260
  • 2康治平,向宏,傅鹂.基于API HOOK技术的特洛伊木马攻防研究[J].信息安全与通信保密,2007,29(2):145-148. 被引量:4
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:364
  • 4李雄.多种环境下身份认证协议的研究与设计[D].北京:北京邮电大学,2012.
  • 5杜丰.韩博.杨洁,等.基于SQLServerMobile与RFID的身份认证设计与实现[J].实验技术与管理,2011,28(5):260-261.
  • 6MellP, Grance T. The NIST definition of cloud computing (draft)[J].NIST special publication, 2011, 800(145):7-12.
  • 7ClarkB, Deshane T, Dow E M, et al. Xen and the Art of RepeatedResearch[C]//USENIX Annual Technical Conference, FPJEENIX Track.2004: 135-144.
  • 8KVM.Kernel based virtual machine[EB/OL] http://www.linux-kvm.org/page/Main一Page,2014-9-11.
  • 9PayneB D, De Carbone M D P, Lee W. Secure and flexible monitoringof virtual machines[C]//Computer Security Applications Conference,2007. ACSAC 2007. Twenty-Third Annual. IEEE, 2007: 385-397.
  • 10NanceK, Hay B, Bishop M. virtual machine introspection[J].IEEEComputer Society, 2008.

引证文献14

二级引证文献90

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部