期刊文献+

基于树形模型的轻量级RFID组证明协议 被引量:1

Tree-based lightweight RFID grouping proof protocol
在线阅读 下载PDF
导出
摘要 射频识别RFID组证明协议作为RFID应用的实例化,对安全性与轻量性的要求较高。根据验证者在协议中的参与方式的不同,分别提出了验证者在线和离线情况下的基于树形模型的轻量级RFID组证明协议OTLP和FLTP。这2个协议能够满足RFID组证明协议的安全性要求,与现有的组证明协议相比,该协议需要较小的计算复杂度,具有较高的效率与可用性。 RFID grouping proof protocol, which was the instantiation of the RFID application, needs higher secure and lightweight requirement. According to the participation of the verifier in the protocol, online and offline verifier tree-based lightweight RFID group proof protocol OTLP and FTLP separatelY were put forward. Both protocols can meet the RFID group proof protocol's security requirements. Compared with the existing group proof protocol, they require less computational complexity and have higher efficiency and availability.
出处 《通信学报》 EI CSCD 北大核心 2015年第11期15-24,共10页 Journal on Communications
基金 国家高技术研究发展计划("863"计划)基金资助项目(2012AA013104)~~
关键词 RFID组证明协议 树形模型 轻量级 RFID grouping proof protocol tree-based model lightweight
  • 相关文献

参考文献28

  • 1STRATEGY ITU, UNIT P. ITU Internet reports 2005: the internet ofthings [R]. Geneva: International Telecommunication Union (ITU),2005.
  • 2周世杰,张文清,罗嘉庆.射频识别(RFID)隐私保护技术综述[J].软件学报,2015,26(4):960-976. 被引量:49
  • 3JUELS A. RFID security and privacy: a research survey [J]. IEEEJournal on Selected Areas in Communications, 2006, 24(2): 381-394.
  • 4HERMANS J,PEETERS R, PRENEEL B. Proper RFID privacy:model and protocols[J], IEEE Transactions on Mobile Computing,2014,13(12); 2888-2902.
  • 5KURKOVSKY S, SYTA E,CASANO B. Continuous RFID-enabledauthentication: privacy implications[J]. Technology and Society Mag-azine, IEEE, 2011,30(3): 34-41.
  • 6ALAVI S M,BAGHERY K, ABDOLMALEKI B. Security and pri-vacy flaws in a recent authentication protocol for EPC Cl G2 RFIDtags[J]. Advances in Computer Science: an International Journal,2014,3(5): 44-52.
  • 7HOEPMAN J H, JOOSTEN R. Practical Schemes for Privacy andSecurity Enhanced RFID[M]. Information Security Theory and Prac-tices. Security and Privacy of Pervasive Systems and Smart Devices,Springer Berlin Heidelberg, 2010.138-153.
  • 8SAITO J, RYOU J C, SAJCURAI K. Enhancing Privacy of UniversalRe-encryption Scheme for RFID Tags[M]. Embedded and UbiquitousComputing. Springer Berlin Heidelberg, 2004.879-890.
  • 9JUELS A. “Yoking-proofs” for RFID tags[A]. Proceeding of the 2ndIEEE Annual Conference on I Pervasive Computing and Communica-tion Workshops[C]. Washington, DC, USA, 2004.138-143.
  • 10SAITO J, SAKURAI K. Grouping proof for RFID tags [A]. Confer-ence on Advanced Information Networking and Applications[C]. Tai-wan, China, 2005.621-624.

二级参考文献57

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 2曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 3International Telecommunication Union. ITU Internet Reports 2005: The Internet of Things, ITU, 2005.
  • 4van Deursen T, Mauw S, Radomirovic S. Untraceability of RFID protocols//Proceedings of the 2nd International Workshop on Information Security Theory and Practice. Seville, Spain, 2008:1-15.
  • 5Ha J, Moon S, Zhou J, Ha J. A new formal proof model for RFID location privacy//Proceedings of the 13th European Symposium on Research in Computer Security. Mddaga, Spain, 2008: 267-281.
  • 6van Deursen T, Radomirovic S. On a new formal proof model for RFID location privacy. Information Processing Letters, 2009, 110(2): 57-61.
  • 7Lim C H, Kwon T. Strong and robust RFID authentication enabling perfect ownership transfer//Proeeedings of the 8th International Conference on Information and Communications Security. Raleigh, NC, USA, 2006:1-20.
  • 8Le T V, Burmester M, de Medeiros B. Universally composable and forward-secure RFID authentication and authenticated key exehange//Proceedings of the 2007 ACM Symposium on InformAtion, Computer and Communications Security. Singapore, 2007:242-252.
  • 9Ouafi K, Phan R C W. Traceable privacy of recent provablysecure RFID Protocols//Proceedings of the 6th International Conference on Applied Cryptography and Network Security. New York, NY, USA, 2008:479-489.
  • 10Phan R C W, Wu J, Ouafi K, Stinson D R. Privacy analysis of forward and backward untraceable RFID authentication schemes. Wireless Personal Communications, Springer, Netherlands, 2010:1-13.

共引文献285

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部