期刊文献+

一种具有可扩展性的RFID标签轻量级组证明协议 被引量:2

A scalable lightweight grouping-proof protocol for RFID tags
在线阅读 下载PDF
导出
摘要 组证明(Grouping-proof)协议的目的是证明阅读器扫描范围内待扫描标签组内标签是否同时存在。随着标签组和组内标签数量的增长,协议中存在的计算时间复杂度、通信总量、组证明生成机制和标签干扰等制约扩展性的因素严重影响了生成有效组证明的成功率。通过比较分析相关协议,设计了一个适用于大规模标签组的只需简单异或和伪随机运算的轻量级组证明协议。在相同的假设模型下,协议能抵抗常见安全攻击,满足强隐私特性的同时,符合超高频段低成本被动式标签的硬件成本要求,具有更高的执行效率。 The purpose of the grouping-proof protocol is to prove if the intra-group tags under scanning exist simultaneouslywithin the scan range of reader.With the quantity increase of tags group and intra-group tags,the factors(such as time complexity computing,communication total quality,grouping-proof generation mechanism and tags interference existing in the protocol)restricting scalability affects on the success rate of the generated effective grouping-proof.On the basis of the comparative analysis of related protocols,a lightweight grouping-proof protocol suitable for large-scale tags group was designed,in which the simple XOR operation and pseudo random operation are carried out for each tag.Under the same presumptive model,the protocolcan resist the common security attacks,satisfy the strong privacy characteristic,conform to the hardware cost requirements ofthe low-cost passive UHF RFID tags,and has high execution efficiency.
作者 尹毅峰 刘扬 徐明明 YIN Yifeng;LIU Yang;XU Mingming(College of Computer and Communication Engineering,Zhengzhou University of Light Industry,Zhengzhou 450001,China)
出处 《现代电子技术》 北大核心 2017年第17期86-90,共5页 Modern Electronics Technique
基金 国家自然科学基金资助项目(61272038 61572445)
关键词 组证明 可扩展性 轻量级 强隐私 grouping-proof scalability lightweight strong privacy
  • 相关文献

参考文献4

二级参考文献71

  • 1侯凌燕,尹军琪,祁庆民.神州数码——上海物流配送中心[J].物流技术与应用,2003,8(7):21-26. 被引量:3
  • 2闵骐.RFID技术在集装箱运输管理中的应用[J].物流科技,2005,28(2):12-14. 被引量:10
  • 3慈新新,曾荣仁,王韬.2005年RFID应用情况回顾[J].微电脑世界,2005(12):132-142. 被引量:6
  • 4刘斌,平锐,孟德良.RFID的潜在问题初探[J].中国无线电,2006(1):39-40. 被引量:10
  • 5周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:214
  • 6Feldhofer M. Comparison of low-power implementations of Trivium and Grain//Proceedings of the Workshop on the State of the Art of Stream Ciphers (SASC 2007). Bochum, Germany, 2007:236-246.
  • 7Feldhofer M, Wolkerstorfer J. Strong crypto for RFID tags--A comparison of low-power hardware implementations//Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 2007). New Orleans, USA, 2007, 27-30.
  • 8Haitner I, Reingold O, Vadhan S. Efficiency improvements in constructing pseudorandom generator from any one-way function//Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC 2010). Cambridge, USA, 2010: 437-446.
  • 9Juels A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394.
  • 10Juels A, Pappu R, Parno B. Unidirectional key distribution across time and space with applications to RFID security// Proceedings of the 17th USENIX Security Symposium. San Jose, Canada, 2008:75-90.

共引文献103

同被引文献7

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部