期刊文献+

射频识别系统安全性设计 被引量:5

Security design of radio frequency identification systems
下载PDF
导出
摘要 射频识别系统的安全性因其广泛的、安全的、敏感的应用而变得重要。基于射频识别系统的特点和信息安全需求,分析并设计了射频识别系统基于共享密钥的身份鉴别和基于流密码的数据加密传输两阶段的安全方案,有助于推动正在兴起的射频识别系统的应用。 The security of privacy-crucial radio frequency identification (RFID) systems is becoming more important than ever for it has been widely and sensitively used. Based on features of RFID systems and their information security requirements, a two-phase approach is theoretically analyzed and designed, which consists of shared-key identity authentication and stream-cipher-based secret data transformation, and it is helpful for promoting the application of the rising RFID systems.
出处 《重庆邮电大学学报(自然科学版)》 2008年第1期90-93,共4页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 国家“863RFID”重大专项研究项目 重庆市教委科技研究项目(KJ070518) 重庆市科委自然科学基金项目(2006BB2430) 重庆邮电大学博士基金(A2007-03)资助
关键词 射频识别 信息安全 身份鉴别 流密码 radio frequency identification (RFID) information security identity authentication stream cipher
  • 相关文献

参考文献5

  • 1[1]RIEBACK M R,CRISPO B,TANENBAUM A S.The evolution of RFID security[J].IEEE Pervasive Computing,2006,5(1):62-69.
  • 2[2]JUELS Ari.RFID security and privacy:a research survey[J].IEEE Journal on Selected Areas in Communications,2006,24(2):381-394.
  • 3[3]WEIS S A,SARMA S E,RIVEST R L,et al.Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems[EB/OL].(2006-11-08)[2007-09-10].http://www.eicar.org/rfid/ kickoffcd/Hintergrundinformationen/Security and Privacy Aspects of Low-Cost RFID systems.pdf.
  • 4[4]FINKENZELLER Klaus.射频识别(RFID)技术-电感应的应答器和非接触IC卡的原理与应用[M].第2版,北京:电子工业出版社,2001.
  • 5周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211

二级参考文献28

  • 1Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 2Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 3Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 4Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 5Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 6Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 7Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 8Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 9Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
  • 10Saito J,Ryou J.C,Sakurai K..Enhancing privacy of universal re-encryption scheme for RFID tags.In:Yang L.T,Guo M,Gao G.R,Jha N.K.eds..Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2004).Lectures Notes in Computer Science 3207.Berlin:Springer-Verlag,2004,879~890

共引文献210

同被引文献29

引证文献5

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部