摘要
射频识别技术是利用无线射频方式进行非接触双向通信,自动识别目标对象并获取相关数据的高新技术,广泛应用于门禁系统、车辆防盗、物流管理等安全防范领域中。文章在简要介绍射频识别系统的工作原理和应用的基础上,针对射频识别系统面临的安全问题,提出相应的防范策略,以促进射频识别技术的健康发展。
二级参考文献34
-
1李毅,李红波.基于RFID技术的车辆综合自动管理系统的设计研究[J].微计算机信息,2005,21(10Z):153-154. 被引量:20
-
2Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
-
3Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
-
4Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
-
5Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
-
6Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
-
7Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
-
8Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
-
9Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
-
10Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
共引文献229
-
1唐慧鑫,马爱霞.无线射频识别技术:实现药品安全监管的新宠儿[J].上海医药,2007,28(8):344-346. 被引量:3
-
2宁方华,张彦伟,俞武嘉.基于随机哈希锁的射频识别门禁系统安全方案[J].吉林大学学报(工学版),2012,42(S1):317-321. 被引量:2
-
3王昭顺,张晓锋.RFID安全隐患及其解决方案[J].射频世界,2007,0(6):27-30.
-
4叶里莎.RFID系统安全问题及对策概述[J].信息安全与通信保密,2007,29(4):89-92. 被引量:5
-
5王天吉.无线射频识别技术(RFID)应用的关键问题[J].现代电子技术,2007,30(8):170-172. 被引量:15
-
6李莉,刘建伟.RFID安全保密技术研究进展[J].信息安全与通信保密,2007,29(8):165-167. 被引量:9
-
7祝胜林,杨波,张明武.RFID协议及其安全性研究[J].信息安全与通信保密,2007,29(8):168-170. 被引量:7
-
8袁昌立.集成RFID的智能建筑系统研究[J].微计算机信息,2007,23(01Z):264-265. 被引量:7
-
9欧阳常青,黄生叶,刘完芳.低成本RFID安全问题综述[J].网络安全技术与应用,2007(10):45-46. 被引量:3
-
10杨洁,曹晟,李品.基于PKI技术的RFID认证模型的研究与应用[J].计算机应用,2007,27(B12):107-109.
同被引文献13
-
1杨海东,杨春.RFID安全问题研究[J].微计算机信息,2008,24(8):238-240. 被引量:34
-
2Dennis E.Brown.RFID implementation/McGraw-Hill communicatlons[C].New York:McGraw-Hill,c2007.
-
3Claus Heinrich.RFID and Beyond dianapolis[R].Indianapolis,IN:Wiley,c2005.
-
4C.M.Roberts.Radio frequency identification(RFID)[J].ELSEVIR CoMputers & Security,2006,25:18-26.
-
5郎为民 刘德敏 李建军.RFID安全机制研究.解放军通信指挥学院/沈阳军区网管中心,2007,9(3).
-
6龙雨 李芳.RFID安全方案研.电脑知识与技术,2008,4(7).
-
7王鑫,李春茂,唐婷.RFID安全与隐私威胁[J].实验技术与管理,2007,24(8):26-29. 被引量:3
-
8Sarma S E,Weis S A, EngelsD W.Radio-Frequency Identification: Secure Risks and Challenges. RSA Laboratories Cryptobytes, 2003,6(1 ): 2-9.
-
9SeisA, Sarma S E, Rivest R L Security and Privacy Aspects of Lowcost Radio Frequency Identification Systems. In: Proceedings of the 1st International Conference on Security in Pervasive Computing. Berlin,2004:201-212.
-
10Suzukik OM, Kinoshita S. Hash Chain Based Forward Secure Privacy Protection Scheme for Low Cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Senda,i 2004:719-724.
-
1董爽,胡智斌.物联网射频识别技术的安全问题及防范策略[J].中国新技术新产品,2011(12):34-34. 被引量:4
-
2李毅.物联网射频识别技术的安全问题及防范策略[J].自动化与仪器仪表,2014(11):159-160. 被引量:2
-
3于瑞华.无线射频识别技术及其在安全防范领域中的应用[J].中国安防,2007(6):50-53. 被引量:1
-
4张亮.基于射频识别技术的车辆识别[J].警察技术,2006(1):43-45. 被引量:2
-
5冯荣,刘文俭.无线视频监控在安全防范中的应用研究[J].无线互联科技,2014,11(6):102-103. 被引量:1
-
6彭小桢,郝福珍,鄢楚平.基于B/S的视频监控系统客户端的设计与实现[J].计算机工程与应用,2007,43(24):208-211. 被引量:18
-
7钟经华.生物识别技术在安防中的应用[J].中国公共安全,2005,0(06A):99-101.
-
8张丽.RFID标签在物流领域的应用[J].甘肃科技纵横,2005,34(4):83-83.
-
9陈刚,李叶紫,胡辉.基于GSM的车辆防盗抢系统设计与实现[J].电气自动化,2005,27(6):48-49. 被引量:5
-
10吕立波.生物识别技术及其在安全防范领域中的应用[J].中国保安,2013(18):51-53.