期刊文献+

一种新型安全机制下的RFID防冲突算法 被引量:5

An Anti-collision Algorithm for a New RFID Security Architecture
下载PDF
导出
摘要 在低成本电子标签中实现安全隐私功能是RFID研究领域需要解决的一项关键技术,该文提出了一种新的解决途径:将物理方法和密码机制相结合,其主要特点是在标签中不使用Hash锁,但在阅读器中采用,这样在标签中大约可节省2万多门电路。此外,为防止非法阅读器的窃听,还设置了多个假名,能够有效地抵抗假冒攻击和重传攻击。最后将该安全策略应用到RFID防冲突算法中,得到一种低成本、安全、实用的二进制防冲突算法。 The method of implementation of security and privacy in low cost RFID tags is a key technique which needs to be solved in research field. This paper proposes a new solution which combines physical method with encryption and the main features are that Hash lock is not applied in tags, rather than is used in readers. By employing this technique, more than 20000 gate circuits will be reduced in tags. Furthermore, several pseudonyms are also adopted to prevent an unauthorized reader from eavesdropping, which can effectively resist counterfeiting attack and relay attack. Finally, a low cost, security and practical binary anti-collision algorithm is developed in this paper by adopting the suggested security architecture to RFID anti-collision algorithm.
出处 《微计算机信息》 北大核心 2008年第26期165-167,共3页 Control & Automation
基金 国家自然科学基金项目(60602055)资助 项目名称:阵列广义空域预滤波器及后置方位估计机理与方法研究
关键词 RFID 安全 隐私 防冲突 二进制树搜索 RFID Security Privacy Anti-collision Binary tree search
  • 相关文献

参考文献11

  • 1Klaus Finkenzeller. RFID Handbook: Radio-frequency identification fundamentals and applications in contactless smart cards and identification, in : 2th Edition, 2003.
  • 2张晖,王东辉.RFID技术及其应用的研究[J].微计算机信息,2007,23(04Z):252-254. 被引量:108
  • 3http://www.gdeii.com.cn/Tec hnique/Tec hnique7.jsp
  • 4周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 5Garfinkel S L, Juels A, Pappu R. RFID Privacy: An overview of problems and proposed solutions. IEEE Security & Privacy Magazine, 2005, 3: 34-44.
  • 6Sarma S E, Weis S A, Engels D W. Radio-frequenc identification: secure risks and challenges.RSA Laboratories Cryptobytes, 2003, 6(1): 2-9.
  • 7Weis S A, Sarma S E, Rivest R L, Engels D W. Security and privacy aspects of low-cost radio frequencY identification systems. Proceedings of the 1 st International Conference on Security in Pervasive Computing, Berlin:Springer-Verlag, Germany, 2004: 201-212.
  • 8Ohkubo M, Suzuki K, Kinoshita S. Hash-chain based forwardsecure privacy protection scheme for low-cost RFID. Proceedings of the 2004 Symposium on Cryptography and Information Security, Sendai, 2004: 719-724.
  • 9Henrici D, Muller P. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops, Washington, IX, USA, 2004: 149-153.
  • 10Molnar D, Wagner D. Privacy and security in library RFID: Issues, practices, and architectures. Proceedings of the llth ACM Conference on Computer and Communications Security, Washington, DC, USA, 2004: 210-219.

二级参考文献35

  • 1余雷.基于RFID电子标签的物联网物流管理系统[J].微计算机信息,2006(01Z):233-235. 被引量:113
  • 2Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 3Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 4Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 5Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 6Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 7Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 8Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 9Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 10Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121

共引文献316

同被引文献29

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部