期刊文献+

RFID安全与隐私威胁 被引量:3

Privacy and security threats in RFID
下载PDF
导出
摘要 RFID是一种利用射频信号自动识别目标对象并获取相关信息的技术。随着标签制造成本的下降,RFID技术大规模应用已成定局,但人们对RFID普及应用所遭受的安全与隐私威胁还不够重视,甚至认为资源严重受限的标签会免于病毒攻击。该文分析了RFID技术应用中的一般安全与隐私威胁及其系统的安伞缺陷.着雷讨论基于RFID的入侵、病毒原理和移动RFID的隐私威胁。 Radio frequency identification (RFID) technology is used to identify objects and users, and automatically takes advantage of contextual information such as users location. This technology has been applied to many fields such as retail and supply chain. At recent, there are increasing number of concerns, and even some resistance, related to user tracking and profiling and other security concerns using RFID technology. Therefore, this paper surveys recent technical research on the problems of privacy and security in various RFID applications and brings up some ideas in mobile RFID and RFID virus, worm and so on.
出处 《实验技术与管理》 CAS 2007年第8期26-29,42,共5页 Experimental Technology and Management
关键词 RFID安全 隐私威胁 入侵 病毒 RFID security privacy threats invading virus
  • 相关文献

参考文献9

  • 1M Weiser.The computer for the 21st century[EB/OL].[1991-09].http://www.ubiq.com/hypertext/weiser/SciAmDraft3.html.
  • 2Z Kfir,A Wool.Picking virtual pockets using relay attacks on contactless smartcard systems[ C ].In 1 st Intl.Conf on Security and Privacy for Emerging Areas in Communication Athens Greece,2005.
  • 3Wikipedia-buffer overflow.http:// en.wikipedia.org/wiki/Buffer_ overflow.
  • 4Rieback M R,Crispo B,Tanenbaum A S.Is your cat infected with a computer virus?[ C ].Forth Annual IEEE International Conference on Pervasive Computing and Communication in Texas America.2006.
  • 5C Anley.Advanced SQL injection in SQL Server applications.http://www.nextgenss.com/papers/advanced_ sql_ injection.pdf.
  • 6A Juels,R L Rivest,M Szydlo.The blocker tag:selective blocking of RFID tags for consumer privacy[C].In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS 2003).Fairfax VA USA,2003.
  • 7Hyangjin Lee,Jeeyeon Kim.Privacy threats and issues in mobile RFID[C].The First International Conference on Availability,Reliability and Security.Vienna,Austria,2006.
  • 8V R Basili and B T Perricone.Software errors and complexity:An empiricsl investigation[J].Commun.ACM,1984,27 (1):42-52.
  • 9B Fabian,O Gunther,S Spiekermann.Security analysis of the object name service for RFID[C].First International Conference on Security,Privacy and Trust in Pervasive and Ubiquitous Computing.2005.

同被引文献41

  • 1Ashrar A.Omer,Johnson P.Thomas.Mutual Authentication Protocols for RFID Systems[J].International Journal of Automation and computing,2008,5(4):348-365. 被引量:3
  • 2唐静,姬东耀.HB协议的形式规约与验证[J].计算机研究与发展,2008,45(z1):113-117. 被引量:1
  • 3Chu Chao-Hsien.Security and privacy threats in RFID traceability network[J].Journal of Southeast University(English Edition),2008,24(S1):132-135. 被引量:1
  • 4周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 5郎为民 刘德敏 李建军.RFID安全机制研究.解放军通信指挥学院/沈阳军区网管中心,2007,9(3).
  • 6Sarma S E,Weis S A, EngelsD W.Radio-Frequency Identification: Secure Risks and Challenges. RSA Laboratories Cryptobytes, 2003,6(1 ): 2-9.
  • 7SeisA, Sarma S E, Rivest R L Security and Privacy Aspects of Lowcost Radio Frequency Identification Systems. In: Proceedings of the 1st International Conference on Security in Pervasive Computing. Berlin,2004:201-212.
  • 8Suzukik OM, Kinoshita S. Hash Chain Based Forward Secure Privacy Protection Scheme for Low Cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Senda,i 2004:719-724.
  • 9Lee SM, Hwang Y J, Lee D H,etal. Efficient Authentication for Low Cost RFID Systems. In: Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005). Lectures Notes in Computer Science 3480. Berlin, 2005:619-627.
  • 10李莉刘建伟.RFID安全保密技术研究进展[D].北京:北京航空航天大学.2008.2.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部