期刊文献+

一个针对低成本RFID标签的双向认证协议

A Mutual Authentication Protocol for Low-cost RFID Tag
原文传递
导出
摘要 文中提出了一种为低成本RFID标签设计的双向认证协议。分析RFID系统可能存在的安全和隐私威胁,包括重放、冒充、后向和前向跟踪、异步攻击和标签位置跟踪。该协议能够有效地防护以上攻击并且与相关方案具备更优的计算性能。 In this paper, a mutual authentication protocol designed for low-cost RFID tag is proposed. The protocol prevents security and privacy threats in RFID system, including replay attack, impersonation, backward and forward traceability, desynchronize attack, and tag location tracking. Storage and computational performances are analyzed to. All these has proved that the proposed protocol could provide better performance as compared with the related schemes.
出处 《信息安全与通信保密》 2009年第8期306-308,312,共4页 Information Security and Communications Privacy
关键词 RFID 认证协议 安全 隐私 RFID authentication protocol security privacy
  • 相关文献

参考文献10

  • 1Juels A. RFID security and privacy: a research survey[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2):381-394.
  • 2Juels A, Garfinkel S, Pappu R. RFID privacy: An overview of problems and proposed solutions[J]. IEEE Security and Privacy, 2005,3(3): 34-43.
  • 3Juels A, Molnar D, Wagner D. Security and privacy issues in e passports[C]//the First international Conference on Security and Privacy For Emerging Areas in Communications Networks, Washington, DC. United States: IEEE Publications, 2005.
  • 4Shamir A, Squash A. New MAC With Provable Security Properties for Highly Constrained Devices Such As RFID Tags[C]// In Nyherg, K. (ed.) FSE 2008, Heidelberg: Springer, 2008.
  • 5Song B, Mitchell C J. RFID authentication protocol for low-cost tags[C]// In WISEC, New York: ACM, 2008:140-147.
  • 6Ohkubo M, Suzuki K, Kinoshita S. Cryptographic Approach to Privacy friendly Tags[EB/OL]. (2003-11-15). http://rfidprivacy. media. mit. edu/2003/papers/ohkubo.pdf.
  • 7Lim C H, Kwon T. Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer[C]//Springer. 2006, Book Series Lecture Notes in Computer Science. Heidelberg: Springer Berlin, 2006: 1-20.
  • 8Ouafi K, Phan R C-W. Traceable Privacy of Recent Provably-Secure RFID Protocols[C]//Proceedings of ACNS' 08, LNES 5037, Heidelberg: Springer Berlin, 2008:479 489.
  • 9欧阳麒,蒋兴浩,孙锬锋.一种基于相互认证的安全RFID系统[J].信息安全与通信保密,2006,28(12):142-144. 被引量:14
  • 10李莉,刘建伟.RFID安全保密技术研究进展[J].信息安全与通信保密,2007,29(8):165-167. 被引量:9

二级参考文献10

  • 1蒋文娟.RFID存在的隐私问题及应用建议[J].计算机安全,2005(10):21-22. 被引量:14
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3郎为民,雷承达,张蕾.RFID技术安全性研究[J].微计算机信息,2006(06Z):269-271. 被引量:28
  • 4[2]Melanie R Rieback,Bruno Crispo,Andrew S Tanenbaum.The Evolution of RFID security.Pervasive Computing IEEE,2006,5:62-69.
  • 5[3]Ari Juels.RFID Security and Privacy:A Research Survey.IEEE Journal on Selected Areas in Communications,2006,24,(2),381-394.
  • 6[5]Weis S A,Sarma S E,Rivest R L,et al.Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems.Security in Pervasive Computing.First International Conference,2004,2802(201-12):201-212.
  • 7[6]Gao Xingxin(Grace),Xiang Zhe(Alex),Wang Hao,et al.An Approach to Security and Privacy of RFID System for Supply Chain.Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business,2004,(14):164-168.
  • 8[2]Garfinkel S L,Juels A,Pappu R.RFID Privacy:An Overview of Problems and Proposed Solutions[J].Security & Privacy Magazine,IEEE,2005,3(3):34~43.
  • 9[3]Ari Juels,Ronald L,Rivest,Michael Szydlo.The Blocker Tag:Selective Blocking of RFID Tags for Consumer Privacy[M].ACM Press,2003:103~111.
  • 10[4]Gunter Karjoth,Paul A.Moskowitz.Disabling RFID Tags with Visible Confirmtion:Clipped Tags Are Silenced[M].ACM Press,2005,27~30.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部