期刊文献+

基于离散ID序列的RFID标签认证协议 被引量:3

Tag Authentication Protocol for RFID Based on Discrete Sequence of ID
下载PDF
导出
摘要 针对RFID的安全问题,提出一种基于离散ID序列的RFID标签认证协议——DSTAP,在此基础上,将DSTAP协议与其他认证协议进行比较分析,采用BAN逻辑对所提出的协议进行形式化分析。分析结果表明,DSTAP协议达到指定的安全设计要求,同时可减少计算量。 Aiming at security and privacy of Radio Frequency Identification(RFID), a discrete sequence of tag ID-based authentication protocol for RFID-DSTAP is proposed. This paper uses it to compare with other authentication protocols and analyzes it with BAN logic. Result of analysis shows that DSTAP meets the specified safety design requirements and the calculation is greatly reduced.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第2期159-161,共3页 Computer Engineering
关键词 无线射频识别技术 认证 逻辑运算 形式化分析 Radio Frequency Identification(RFID) authentication logical operation formal analysis
  • 相关文献

参考文献5

  • 1Zhang Lan, Zhou Huaibei, Kong Ruoshan, et al. An Improved Approach to Security and Privacy of RFID Application System[C]//Proc. of International Conference on Wireless Communications, Networking and Mobile Computing. Wuhan, China: [s. n.], 2005.
  • 2Chen Y C, Wang Weilin, Hwang M S. RFID Authentication Protocol for Anti-counterfeiting and Privacy Protection[C]//Proc. of the 9th International Conference on Advanced Communication Technology. Phoenix Park, Korea: [s. n.], 2007.
  • 3Li Y Z, Cho Y B, Um N K, et al. Security and Privacy on Authentication Protocol for Low-cost RFID[C]//Proc. of Computational Intelligence and Security. International Conference. Guangzhou, China: [s. n.], 2006: 3-6.
  • 4Chiu C T, Sheng Bo, Li Qun Protocols for RFID[C]//Proc. Serverless Search and Authentication of the 15th Annual IEEE International Conference on Pervasive Computing and Communications. White Plains, New York, USA: [s. n.], 2007.
  • 5冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102

二级参考文献32

  • 1Bellare M, Neven G. Transitive signatures based on factoring and RSA. In: Zheng Y, ed. Proc. of the Advances in CryptologyASIACRYPT 2002. LNCS 2501, Berlin, Heidelberg: Springer-Verlag, 2002. 397-4 14.
  • 2Goh EJ, Jarecki S. A signature scheme as secure as the Diffie-Hellman problem. In: Biham E, ed. Proc. of the Advances in Cryptology-EUROCRYPT 2003. LNCS 2656, Berlin, Heidelberg: Springer-Verlag, 2003. 401-415.
  • 3Koeune F. Careful design and integration of cryptographic primitives with contributions to timing attack, padding schemes and random number generators [Ph.D. Thesis]. Louvain-la-Neuve: Universite Catholique de Louvain, 2001.
  • 4Gennaro R, Halevi S, Rabin T. Secure Hash-and-sign signatures without the random oracle. In: Stern J, ed. Proc. of the Advances in Cryptology-EUROCRYPT'99. LNCS 1592, Berlin, Heidelberg: Springer-Verlag, 1999.123-139.
  • 5Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proc. of the Advances in Cryptology-Crypto'98. LNCS 1462, Berlin, Heidelberg: Springer-Verlag, 1998. 13-25.
  • 6Needham R, Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978,21 (12) :993 -999.
  • 7Sacco G. Timestamps in key distribution protocols. Communications of the ACM, 1981,24(8):523-536.
  • 8Burrows M, Abadi M, Needham R. A logic for authentication. ACM Trans. on Computer Systems, 1990,8(1):18-36.
  • 9Bellare M, Rogaway P. Entity authentication and key exchange. In: Stinson D.R, ed. Proc. of the Advances in CryptologyCrypto'93. LNCS 773, Berlin, Heidelberg: Springer-Verlag, 1993. 232-249.
  • 10Bellare M. Provably secure session key distribution-The three party case. In: Proc. of the ACM Symp. on the Theory of Computing. New York: ACM Press, 1995.57-66. http:∥doi.acm.org/10.1145/225058.225084.

共引文献101

同被引文献27

  • 1陈兵,郑嘉琦.轻型的RFID安全认证协议LAP[J].通信学报,2013,34(S1):1-7. 被引量:1
  • 2薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:61
  • 3周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 4Ari J.RFID Security and Privacy:A Research Survey[J].IEEEJournal on Selected Areas in Communications,2006,24(2):381-394.
  • 5Weis S A,Sarma S E,Rivest R L,et al.Security and PrivacyAspects of Low-cost Radio Frequency Identification Systems[C]//Proc.of the 1st Security in Pervasive Computing.Berlin,Germany:Springer-Verlag,2003.
  • 6Ohkubo M,Suzuki K,Kinoshita S.Hash-chain Based Forward-secure Privacy Protection Scheme for Low-cost RFID[C]//Proc.ofSymposium on Cryptography and Information Security.Sendai,China:[s.n.],2004.
  • 7Molnar D,Wagner D.Privacy and Security in Library RFID:Issues,Practices,and Architectures[C]//Proc.of the 11th ACMConference on Computer and Communications Security.Washington D.C.,USA:[s.n.],2004.
  • 8Lee S M,Hwang Y J,Lee D H,et al.Efficient Authentication forLow-cost RFID Systems[C]//Proc.of International Conference onComputational Science and Its Applications.Berlin,Germany:Springer-Verlag,2005.
  • 9Wang Hua,Sun Lili,Yong Jianming,et al.Privacy Preserving onRadio Frequency Identification Systems[C]//Proc.of the 13thInternational Conference on Computer Supported CooperativeWork in Design.Santiago,Chile:[s.n.],2009.
  • 10Bao Guihao,Zhang Minggao,Liu Jiuwen,et al.The Design of anRFID Security Protocol Based on RSA Signature forE-ticket[C]//Proc.of the 2nd IEEE International Conference onInformation Management and Engineering.Chengdu,China:[s.n.],2010.

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部