期刊文献+

基于随机Hash-Chain的RFID安全协议研究 被引量:5

Research on Random Hash-Chain Cryptographic Protocol for RFID
下载PDF
导出
摘要 无线射频识别(RFID)作为一种新型的自动识别技术正逐渐得到广泛应用,但RFID系统的特点和RFID设备的局限性带来了很多安全隐患问题。针对这些问题,讨论并阐明RFID系统组成和安全隐患,分析了几种现有的典型的RFID安全协议的特点和缺陷,最后提出了一种基于随机Hash-Chain的RFID安全协议。 Radio Frequency Identification(RFID) as a new automated identification technology has become popular in many applications. But the features of the RFID systems and the constraints of RFID devices bring about various privacy problems. To address these issues, the structure and privacy problems of RFID systems were discussed and clarified in this paper, and the features and issues pertinent to several current typical RFID cryptographie protocols were analyzed Finally, a new cryptographic protocol for RFID based on random Hash-Chain was proposed.
出处 《微计算机信息》 北大核心 2008年第29期194-196,共3页 Control & Automation
基金 国家863计划RFID技术在汽车制造过程控制与质量跟踪系统中的应用 颁发部门:科技部(04A1213) 基金项目安徽省2007年度重点科研计划项目农村合作医疗信息系统研究 颁发部门:安徽省科技厅(07020303079)
关键词 RFID系统 安全协议 HASH链 RFID system cryptographie protocol Hash Chain
  • 相关文献

参考文献5

  • 1Sarma S. E. , Weis S. A. , Engels D. W.. RFID systems and security and privacy implications. In : Kaliski B. S. , Koc C.K. , Paar C. eds.. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) . Lectures Notes in Computer Science 2523. Berlin : Springer-Verlag , 2003,454-469
  • 2Sarma S. E. , Weis S. A. ,Engeis D. W.. Radio frequency identification : Secure risks and challenges. RSA Laboratories Cryptobytes , 2003 , 6 (1) : 2-9
  • 3Weis S. A., Sarma S. E., Rivest R. L., Engels D. W.. Security and privacy aspects of low-cost radio frequency identification systems. In : Proc. of Security in Pervasive Computing 04,2004:201-212
  • 4Ohkubo M. , Suzuki K. , Kinoshita S.. Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In : Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004) , Sendal , 2004,719-724
  • 5余雷.基于RFID电子标签的物联网物流管理系统[J].微计算机信息,2006(01Z):233-235. 被引量:113

二级参考文献3

  • 1苏荣艳,常久鹏,邵力清,邓康耀.基于CAN总线的发动机测控系统接口通信卡的设计[J].微计算机信息,2005,21(1):101-102. 被引量:14
  • 2C.; Declercq,M.; Joehl,N.; Curty,J.-P.Dehollain,"A global survey on short range low power wireless data transmission architec- tures for ISM applications."[C] ,Semiconductor Conference,2001.CAS 2001 Proceedings.International ,Volume:1 ,2001 Page(s):117 -126 vol.1
  • 3Rao,K.V.S,"An overview of backscattered radio frequency identification system (RFID) ",[C] Microwave Conference,1999 Asia Pa- cific ,Volume:3 ,1999 ,Page(s):746 -749 vol.3.

共引文献112

同被引文献20

  • 1杨海东,杨春.RFID安全问题研究[J].微计算机信息,2008,24(8):238-240. 被引量:34
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 4BURROWS M A,NEEDHAM R. A Logic of authentication [J].ACM Transactions on Computer Systems,1990,8 (1):18- 36.
  • 5SARMA S E,WEIS S A,ENGELS N W. RFID systems and security and privacy implications [C]. 4th Internationa Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002),Lectures Notes in Computer Science 2523.Berlin : Springer-Verlag, 2003 : 454-469.
  • 6OHKUBO M,SUZUKI K, KINOSHITA S. Cryptographic approach to "Privacy-Friendly" tags [C]//Proc of RFID Privacy Workshop, USA MIT, 2003.
  • 7SARMA S E, WEISS A, ENGELS D W. Radio frequency identification:Secure risks and challenges[J]. RSA Laboratories Cryptobytes, 2003,6(1):2-9.
  • 8Burrows M A,Needham R.A Logic of Authentication [J].ACM Transactions on Computer Systems,1990,8(1):18-36.
  • 9Ohkubo M,Suzuki K, Kinoshita S. Cryptographic Approach to Privacy-Friendly" Tags [C]//Proc. of RFID Privacy Workshop,USA MIT, 2003.
  • 10Sarma S.E.,Weis S.A.,Engels D.W..Radio frequency identification:Secure risks and challenges [J].RSA Laboratories Cryptobytes, 2003,6(1):2-9.

引证文献5

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部