期刊文献+

基于Hash链的RFID隐私增强标签研究 被引量:6

Research on Hash chain-based RFID privacy enhancement tag
下载PDF
导出
摘要 无线射频识别(RFID)作为一种新型的自动识别技术在供应链与零售业中得到了广泛的应用。然而由于RFID标签强大的追踪能力,RFID的广泛应用也势必给消费者带来新的隐私威胁问题。在构造RFID方案时有几个技术关键点,尤其重要的是消费者隐私与标签信息的安全问题。低成本是另外一个关键。针对这些问题,讨论并阐明了RFID系统的需求与限制,分析了现有的一些相关的RFID方案的特性与问题。最后提出了一种简单的采用低成本的Hash链机制的安全模式标签来增强消费者隐私。 Radio Frequency Identification (RFID) as a new automated identification technology has become popular with the supply chain and retail business. However, the widespread employment of RFID tags may bring new threats to the consumers' privacy, due to the powerful tracking capability of the tags. There are several important technical points when constructing an RFID scheme. What is particularly important is the issue of consumers' privacy and security of tag information. Low cost implementation is another one. To address these issues, the requirements and restrictions of RFID systems were discussed and clarified in this paper, and the features and issues pertinent to several current RFID schemes were analyzed. Finally, a simple secure mode tag which adopted a low cost hash chain mechanism to enhance the consumers' privacy was proposed.
出处 《计算机应用》 CSCD 北大核心 2006年第10期2328-2331,共4页 journal of Computer Applications
基金 四川省青年软件创新工程资助项目(2004AA0353)
关键词 射频识别 隐私 安全 隐私增强技术 Radio Frequency Identification(RFID) privacy security privacy enhancement technology
  • 相关文献

参考文献10

  • 1FINKENZELLER K.射频识别(RFID)技术--无线电感应的应答器和非接触IC卡的原理与应用[M].陈大才译.北京:电子工业出版社,2001:5-8.
  • 2WEIS S.Security and privacy in radio frequency identification devices[D].Master thesis of MIT,Massachusetts USA,2003.
  • 3SPIEKERMANN S,BERTHOLD O.Maintaining privacy in RFID enabled environments-Proposal for a disable-model[A].Workshop on Security and Privacy,Conference on Pervasive Computing[C].Vienna,Austria,2004.
  • 4AVOINE G.Cryptography in radio frequency identification and fair exchange protocols[D].PhD Thesis of Swiss Federal Institute of Technology (EPFL),Lausanne Switzerland,2005.
  • 5AVOINE G,OECHSLIN P.A scalable and provably secure hash based R FID protocol[A].In International Workshop on Pervasive Computing and Communication Security[C].Kauai Island,Hawaii,USA:IEEE Computer Society Press,2005.110 -114.
  • 6JUELS A.RFID security and privacy:A Research Survey[R].Bedford,MA,USA:RSA Laboratories,2005.
  • 7JUELS A,RIVEST RL SZYDLO M.The Blocker Tag:Selective blocking of RFID tags for consumer privacy[A].Proceedings of the 10th ACM Conference on Computer and Communications Security[C].ACM Press,2003.103-111.
  • 8JUELS A.Minimalist cryptography for low-cost RFID tags[A].The Fourth International Conference on Security in Communication Networks[C].Amalfi,Italy:LNCS,Springer-Verlag.2004.
  • 9HENRICI D,MULLER P.Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers[A].In Pervasive Computing and Communications[C].IEEE Computer Society,2004.149-153.
  • 10RIEBACK MR,CRISPO B,TANENBAUM AS.The evolution of RFID security[J].IEEE Pervasive Computing,2006,5(1):62 -69.

共引文献4

同被引文献27

引证文献6

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部