期刊文献+

基于混合加密的RFID轻量安全通信协议 被引量:2

A RFID lightweight security communication protocol based on hybrid encrypting approach
原文传递
导出
摘要 在分析现有无线射频识别(RFID)通信协议在应用中存在的安全及隐私问题的基础上,结合公钥加密算法和对称密钥加密算法,提出了在RFID标签芯片计算资源受限的情况下解决这些问题的一个轻量安全通信协议,并给出了基于逻辑分析的形式化证明.该协议能够解决RFID系统中存在的信息泄露、重放攻击、位置追踪、假冒攻击、去同步化、前向安全等安全问题,具有很好的安全性和私密性,且具有较好的实现效率和实现成本,适合实际RFID系统的使用. Based on the analysis of the features and issues pertinent to the current radio frequency identification(RFID) communication protocols,a lightweight security communication protocol(LSCP) was proposed combining public key encryption and symmetric cryptosystem.The formal proof of correctness of new protocol was given based on logic.The proposed protocol can be used to prevent many security problems including information leakage,replay attack,location tracing,spoofing attack and forward security etc.It has good security and privacy.Moreover,the performance and cost of the protocol had also been analyzed,results show that the protocol is suitable for practical use in RFID system.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第S1期328-331,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 江苏省自然科学基金资助项目(BK20082140) 淮海工学院校内课题资助项目(KX10530)
关键词 无线射频识别 轻量安全通信协议 哈希函数 高级数据加密标准 公钥加密 radio frequency identification(RFID) lightweight security communication protocol Hash function advanced encryption standard(AES) public key encryption
  • 相关文献

参考文献9

  • 1Information technology - Radio frequency identification for item management - Part 6: Parameters for air interface communications at 860 MHz to 960 MHz. ISO/IEC 18000-6-2004 . 2004
  • 2Mlyako Ohkubo,Koutarou Suzuki,Shingo Kinoshita.Cryptographic Approach to Privacy-Friendly Tags. http://www.r_dprivacy.org/2003/papers. ohkubo.pdf .
  • 3JUELS A,PAPPU R.Squealing Euros:Privacy protection in RFID-enabled banknotes. Proc.Financial Cryptography . 2003
  • 4WEIS S A,SARMA S E,RIVEST R L,et al.Security and privacyaspects of low-cost radio frequency identification systems. Pro-ceedings of the First International Conference Security in PervasiveComputing . 2003
  • 5Rhee K,Kwak J,Kim S,et al.Challenge-response based RFID authentication protocol for distributed database en-vironment. Proc of the2nd International Conference on Security in Pervasive Computing(SPC2005) . 2005
  • 6Martin Feldhofer,Sandra Dominikus,Johannes Wolkerstorfer.Strong authentication for RFID systems usingthe AES algorithm. Workshopon Cryptographic Hardwareand Embedded Systems-CHES 2004 . 2004
  • 7DIMITRIOU T.A lightweight RFID protocol to protect against trace-ability and cloning attacks. Proceedings of 1st InternationalConference on Security and Privacy for Emerging Areas in Communi-cation Networks . 2005
  • 8Lee S.Mutual authentication of RFID system usingsynchronized secret information. . 2005
  • 9Lim T L,Li T,Li Y.A security and performanceevaluation of Hash-based RFID protocols. Inscrypt 2008 . 2009

同被引文献9

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部