期刊文献+

基于Hash链的可扩展RFID验证协议 被引量:7

Scalable Hash-chain-based RFID Authentication Protocol
下载PDF
导出
摘要 射频识别(RFID)的广泛应用带来了用户隐私和安全问题。基于Hash的RFID验证协议是受到广泛关注的解决方案,但其中的一些协议随着标签数量的增加,数据库计算量快速上升,不具扩展性。另外一些协议具有可扩展性但容易被跟踪。该文采用Hash链预计算的方法解决两者的矛盾,并且协议具有前向安全、抗碰撞、防失同步攻击等安全特性,实验结果验证了其可扩展性。 The wide deployment of RFID brings user privacy and security concern. Hash based RFID authentication protocol is a kind of solution attracting many attentions. But in some of them, the computation requirement of database grows rapidly as members of tags grow, so they are not scalable, some of them are scalable but tend to be traceable. This paper adopts the method of pre-calculation of hash-chain to solve the contradiction. Moreover, the protocol has property of forward-security, anti-collision, anti-desynchronization. Simulation verifies its scalability.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第4期173-175,共3页 Computer Engineering
基金 天津市应用基础研究计划基金资助项目(06YFJMJC00200) 天津市高等学校科技发展基金资助项目(20051518) 南开大学创新基金资助项目
关键词 射频识别 安全 可扩展的 HASH链 Radio-Frequency Identification Devices(RFID) security scalable Hash-chain
  • 相关文献

参考文献11

  • 1Juels A. RFID Security and Privacy: A Research Survey[J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2): 381-394.
  • 2Sarma S, Weis S, Engels D. RHD Systems and Security and Privacy Implications[C]//Proc. of CHES'02. [S. 1.]: Springer, 2002: 454- 469.
  • 3Rhee K, Kwak J, Kim S, et al. Challenge-response Based RFID Authentication Protocol for Distributed Database Environment[C]// Proceedings of the 2nd International Conference on Security in Pervasive Computing. [S. 1 .]: Springer, 2005: 70-84.
  • 4Henrici D, MUller E Hash-based Enhancement of Location Privacy for Radio-frequency Identification Devices Using Varying[C]// Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops. Washington, D. C., USA: [s. n.]. 2004: 149-153.
  • 5Tsudik G. YA-TRAP: Yet Another Trivial RFID Authentication Protocol[C]//Proceedings of International Conference on Pervasive Computing and Communications. Washington, D. C., USA: [s. n.]. 2006: 640-643.
  • 6Seo Y, Kim K. Scalable and Untraceable Authentication Protocol for RFID[C]//Proceedings of the 2nd International Workshop on Security Ubiquitous Computing Systems. [S. 1.]: Springer, 2006: 252-261.
  • 7Molnar D, Wagner D. Privacy and Security in Library RFID Issues, Practices, and Architectures[C]//Proceedings of the 11th ACM Conference on Computer and Communications Security. [S. 1.]: ACM Press, 2004: 210-219.
  • 8Avoine G, Dysli E, Oechslin P. Reducing Time Complexity in RFID Systems[C]//Proceedings of Selected Areas in Cryptography'05.[S. 1.]: Springer, 2006: 291-306.
  • 9Ohkubo M, Suzuki K, Kinoshita S. Hash-chain Based Forwardsecure Privacy Protection Scheme for Low-cost RFID[C]// Proceedings of the 2004 Symposium on Cryptography and Information Security. Berlin: Springer-Verlag, 2004:719-724.
  • 10Lee Y, Verbauwhede I. Secure and Low-cost RFID Authentication Protocols[C]//Proceedings of the 2nd IEEE Workshop on Adaptive Wireless Networks. [S. 1 .]: Springer-Verlag, 2005: 1-5.

同被引文献72

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2赵克文,寇卫东,肖玉霞.基于分级思想的射频识别技术安全认证过程的研究[J].电子科技,2006,19(8):7-11. 被引量:1
  • 3曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 4Juels A. RFID Security and Privacy: A Research Survey[J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2): 381-394.
  • 5Ohkubo M, Suzuki K, Kinoshita S. Cryptographic Approach to "Privacy-friendly" Tags[C]//Proc. of RFID Privacy Workshop. Cambridge, MA, USA: [s. n.], 2003: 77-83.
  • 6Sarma S, Weis S, Engels D. RFID Systems and Security and Privacy Implications[C]//Proc. of Workshop on Cryptographic Hardware and Embedded Systems. [S. l.]: Springer, 2002: 454-469.
  • 7Lee S M, Hwang Y J, Lee D H. Efficient Authentication for Low-cost RFID Systems[C]//Proc. of the International Conference on Computational Science and Its Applications. Berlin, Germany: [s. n.], 2005: 619-627.
  • 8Dimitriou T. A Lightweight RFID Protocol to Protect Against Traceability and Cloning attacks[C]//Proe, of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks. Athens, Greece: [s. n.], 2005: 59-66.
  • 9Violino B. Leveraging Internet of things [J]. RFID Journal,2005. 1-2.
  • 10Hart S, Dhillon T S, Chang E. Anonymous mutual authentication protocol for RFID tag without back-end database [C]//Proceedings of the 3rd International Conference on Mobile Ad-hoc and Sensor Networks. Berlin: Springer-Verlag, 2007:623-632.

引证文献7

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部