期刊文献+

基于数据缓存机制的RFID安全协议(英文) 被引量:3

RFID Protocols Based on Data Buffer Mechanism
下载PDF
导出
摘要 随着射频识别技术更为广泛地应用于人们的日常生活,安全和隐私问题越来越受到人们的关注。为了寻求一种更好的安全机制,本文首先对现有的安全机制进行了分析,指出了其不足,并将数据缓存机制应用于解决现有的几种安全隐患,讨论了机制的有效性和灵活性。应用分析表明,基于数据缓存机制在射频识别技术系统安全防护应用中适用性强,具有很好的应用前景。 As Radio Frequency Identification(RFID) has become popular in our daily lives, security and privacy problems in the application of RFID become a central concern. Aiming to find a better mechanism in security and privacy problems, the main limitations of the existing mechanisms applied in the existing protocols on the security and privacy problems of RFID systems are discussed firstly, and then the simplicity and validity of the data buffer mechanism are tested by proposing some protocols against the main attacks. Finally, the conclusion that the data buffer mechanism is flexible and adaptable in dealing with variable attacks and will be promising in protecting RFID systems against new security and privacy problems in the future is drawn.
出处 《信息与电子工程》 2008年第5期371-374,382,共5页 information and electronic engineering
关键词 射频识别技术 数据缓存 安全 协议 Radio Frequency Identification data buffer security protocol
  • 相关文献

参考文献11

  • 1ZHANG Xiao-dan YUE Shu-jie WANG Wei-min.The review of RFID applications in global postal and courier services[J].The Journal of China Universities of Posts and Telecommunications,2006,13(4):106-110. 被引量:2
  • 2[2]Weis S A,Sarma S E,Rivest R L,et al.Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems[C]//Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004:201-212.
  • 3[3]Juels A,Rivest R L,Szydlo M.The Blocker tag:Selective Blocking of RFID Tags for Consumer Privacy[C]// Proceedings of the10th ACM Conference on Computer and Communications Security(CCS 2003),Washington,DC,USA,2003:103-111.
  • 4[4]Moskowitz P A,Lauris A L,Morris S S.A Privacy-Enhancing Radio Frequency Identification Tag:Implementation of theClipped Tag[C]// Proceeding of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07),New York,USA,2007:348-351.
  • 5[5]Sarma S E,Engels D W.RFID systems and security and privacy implications[C]// Proceedings of the 4th International,Work -shop on Cryptographic Hardware and Embedded Systems(CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003:454-469.
  • 6[6]Dae-Hee Seo,Jang-Mi Baek,Jiang Li,et al.A Study on Improved RFID Authentication Scheme[C]// 2007 International Conferenceon Multimedia and Ubiquitous Engineering (MUE'07).Seoul,Korea,2007:567-572.
  • 7[7]Dimitriou T.A Lightweight RFID Protocol to protect against Traceability and Cloning attacks[C]// Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).Athens,Greece,2005:59-66.
  • 8[8]Juels A,Weis S.Authenticating pervasive devices with human protocols[C]// Advances in Cryptology-CRYPTO'05.Volume 3126 of Lecture Notes in Computer Science,Springer-Verlag,2005:293-308.
  • 9[9]Hopper N J,Blum M.Secure Human Identification Protocols[C]// Advances in Cryptology-ASIACRYPT 2001.Vol.2248 of Lecture Notes in Computer Science,Spinger-Verlag,2001:52-66.
  • 10[10]Bringer J,Chabanne H,Dottax E.HB++:a Lightweight Authentication Protocol Secure Against Some Attacks[C]// Second International workshop on Security,Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).Lyon,France,2006:28-33.

二级参考文献3

共引文献1

同被引文献27

  • 1赵海,欧阳元新,熊璋.用于RFID中间件的主存数据库索引结构[J].华中科技大学学报(自然科学版),2012,40(S1):92-94. 被引量:1
  • 2肖礼盛,朱绍文,李中正,黄智.基于PDA电路加密模块的实现[J].信息安全与通信保密,2007,29(4):106-107. 被引量:1
  • 3曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 4Want R. An Introduction to RFID Technology[J]. IEEE Pervasive Computing, 2006,5(1):25-33.
  • 5EPCGLOBAL INC[EB/OL]. [2009-06-24]. hltp://www.epcglobaline.org/standards_technology/specifications.html.
  • 6Kim H S, Oh J H,Choi J Y. Security Analysis of RFID Authentication for Pervasive Systems using Model Checking[C]//Proc. of the 30th Annual International Computer Software and Applications Conference. 2006.
  • 7Nohl K,Plotz H Mifare,little security, despite obscurity[C]//Presentation on the 24th Congress of the Chaos Computer Club. Berlin, 2007.
  • 8Garcia F D,Koning Gans G,Muijrers R,et al. Dismantling MIFARE Classic[R/OL]. [2009-06-24]. http://www.sos.cs.ru.nl /applications/rfid/2008-esorics.pdf.
  • 9Wheeler D J,Needham R M. TEA, a Tiny Encryption AlgorithmiC]//Fast Software Encryption. 1994:363-366.
  • 10Needham R M,Wheeler D J. Tea extensions[R/OL]. [2009-06-24]. http://www.movable-type.co.uk/scripts/xtea.pdf.

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部