期刊文献+

供应链环境下通用可组合安全的RFID通信协议 被引量:30

A Universally Composable Secure RFID Communication Protocol in Supply Chains
下载PDF
导出
摘要 供应链管理是RFID技术的主要应用领域之一,但是目前该领域对基于RFID技术的安全机制还没有较深入的研究.供应链环境的特定安全需求决定了无法直接应用已有的各种RFID安全机制.该文定义了供应链环境下RFID通信协议必须满足的安全需求,提出了一个可以满足这些安全需求的通用可组合安全模型,设计了一个可以实现该模型的轻量级RFID通信协议.协议的设计和证明采用模块化的方法,并可以保证在复杂网络环境下的安全运行.文章进一步对不可链接性进行了形式化定义,并根据安全属性对典型的RFID通信协议进行分类. Supply chain management is the major field for RFID application. However, little work has been conducted to address the security issues in this context. Existing RFID solutions cannot be applied directly in this field because of a set of special RFID security requirements to be addressed for supply chain management. The major contribution of this paper is to identify the unique set of security requirements for secure RFID communications in supply chains, propose a universally composable model that satisfies the security requirements, and design a lightweight protocol that realizes the universally composable model. This paper further defines the security requirement of unlinkability, and classifies the typical RFID protocols according to the security requirements.
出处 《计算机学报》 EI CSCD 北大核心 2008年第10期1754-1767,共14页 Chinese Journal of Computers
基金 国家自然科学基金(90204012,60573035,60573036,60743005) 北京市自然科学基金(4082028)资助
关键词 供应链管理 RFID 安全 通用可组合模型 协议 supply chain management RFID security universally composable model protocol
  • 相关文献

参考文献38

  • 1Sarma S, Weis S, Engels D. White paper: RFID systems, security and privacy implications. Auto-ID Center, MIT:Technical Report MIT-AUTOID-WH-014, 2002
  • 2Juels A, Weis S A. Defining strong privacy for rfid//Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'07). Washington, DC, USA, 2007:342-347
  • 3Burmester M, Le T, Medeiros B. Provably secure ubiquitous systems: Universally composable RFID authentication protocols//Proceedings of the Conference on Security and Privacy in Communication Networks (SECURECOMM). Baltimore, Maryland, USA, 2006:1-9
  • 4Li Y, Ding X. Protecting rfid communications in supply chains//Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security ( ASIACCS' 07). Singapore, 2007:234-241
  • 5Sarma S, Weis S, Engels D. Radio-frequency identification systems//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems. San Francisco, USA, 2002:454 -469
  • 6Juels A. RFID security and privacy: A research survey. Journal of Selected Areas in Communication (J-SAC), 2006, 24(2) : 381-395
  • 7Juels A, Rivest R L, Szydlo M. The blocker tag: Selective blocking of RFID tags for consumer privacy//Proceedings of the 8th ACM Conference on Computer and Communications Security(CCS). Washington DC, USA, 2003:103-111
  • 8Weis S A, Sarma S E, Rivest R L, Engels D W. Security and privacy aspects of low-cost radio frequency identification systems//Proceedings of the International Conference on Security in Pervasive Computing--SPC 2003, Lecture Notes in Computer Science 2802. Boppard, Germany, Springer-Verlag, 2003:201-212
  • 9Ohkubo M, Suzuki K, Kinoshita S. Efficient hash-chain based RFID privacy protection scheme//Proceedings of the International Conference on Ubiquitous Computing--Ubicomp, Workshop Privacy: Current Status and Future Directions. Nottingham, England, Springer-Verlag, 2004
  • 10Tsudik G. YA-TRAP: Yet another trivial RFID authentication protoeol//Proceedings of the International Conference on Pervasive Computing and Communications-- PerCom 2006. Pisa, Italy, 2006:640-643

同被引文献337

引证文献30

二级引证文献289

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部