期刊文献+

一种RFID系统反跟踪安全通信协议 被引量:1

AN ANTI-TRACING SECURITY COMMUNICATION PROTOCOL ADAPTED TO RFID SYSTEM
下载PDF
导出
摘要 典型RFID标签在计算能力和通信、存储等方面的能力受到严格限制,如何保证RFID系统的安全性对传统安全问题提出了许多挑战。提出一种不可追踪的RFID通信协议UNTRACE,在标签端只需要计算一个密钥hash函数,以最小的代价实现标签和阅读器之间的交互,同时后端服务器的计算代价也很低。通用的协议分析方法证明此协议的性能与已经提出的协议相当,而计算代价较低。 The computing ability, communication ability and storing ability of typical RFID tag and reader are strictly limited, this puts for-ward challenges to traditional security system in bow to keep RFID system secure. To make up the shortcomings of existing methods, an antitracing RFID communication protocol, called UNTEACE,is proposed in this paper, which only computes one key Hash function for tags, and implements the interaction between tags and readers with least cost. At the same time,the computational cost of backend sever is low too. Universal analyses method of protocol proves that the proposed protocol has equal performance to existing famous anti-tracing protocols but has lower computation cost.
出处 《计算机应用与软件》 CSCD 2009年第6期275-277,共3页 Computer Applications and Software
关键词 RFID 安全 协议 哈希 反跟踪 RFID Safety Protocol Hash Un-tracing
  • 相关文献

参考文献7

  • 1Ferguson R B.RFID:Locked and Loaded for NATO.eWeek,February 20,2006,[Online].http://www.eweek.com/article2/0,1895,1926586,00.asp.
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 3曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 4Gardner C.DoD:Radio Frequency Identification.AIAGs third annual RFID Summit,November 2,2006,[online].https://mows.aiag.org/scriptcontent/event_presentations/Files/E6RFID01SP/DOD_final.pdf.
  • 5Molnar D,Soppera A,Wagner D,et al.Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.Workshop in Selected Areas in Cryptography,August 2005.
  • 6Avoine G,Oechslin P.A Scalable and Provably Secure Hash-Based RFID Protocol.IEEE PerSec Workshop,March 2005.
  • 7Herzberg A,Krawczyk H,Tsudik G.On Traveling Incognito.IEEE Workshop on Mobile Systems and Applications,December 1994.

二级参考文献33

  • 1Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 2Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 3Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 4Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 5Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 6Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 7Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 8Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 9Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
  • 10Saito J,Ryou J.C,Sakurai K..Enhancing privacy of universal re-encryption scheme for RFID tags.In:Yang L.T,Guo M,Gao G.R,Jha N.K.eds..Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2004).Lectures Notes in Computer Science 3207.Berlin:Springer-Verlag,2004,879~890

共引文献228

同被引文献4

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部