期刊文献+

适用于供应链的RFID读写器-标签双向认证协议

A RFID READER-TAG MUTUAL AUTHENTICATION PROTOCOL SUITABLE FOR SUPPLY CHAIN
下载PDF
导出
摘要 基于批量处理的特性,提出一个适用于供应链的可扩展的读写器-标签双向认证协议。在该协议中,后端数据库识别一个标签只需运行3次哈希函数和O(logn)次比较大小的运算,标签的计算量和已有的不可扩展的协议相当。提出的协议显著提高了射频识别RFID(Radio Frequency Identification)供应链管理系统的效率,并且满足其安全需求。 In this paper,we propose a scalable reader-tag mutual authentication protocol suitable for efficient supply chain management, which is based on supply chain' s batch processing property. In the protocol, the backend database only needs to perform 3 times of hash function and O( log n) operations of size comparing for authenticating a tag,while the computation cost of the tag is comparable with the existing unscalable protocols. The proposal remarkably improves the RFID supply chain management system' s efficiency, and also meets its security requirements.
出处 《计算机应用与软件》 CSCD 2009年第8期8-9,89,共3页 Computer Applications and Software
基金 国家自然科学基金项目(60573054)
关键词 供应链 双向认证协议 可扩展性 Supply chain Mutual authentication protocol Scalability
  • 相关文献

参考文献7

  • 1Sarma S E,Weis S A,Engels D W.RFID systems and security and privacy implications[C]//In:Kaliski B S,Koc C K,Paar C.eds.Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer Verlag,2003:454-469.
  • 2Ohkubo M,Suzuki K,Kinoshita S.Hash-chain based forward secure privacy protection scheme for low-cost RFID[C]//In:Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004),Sendai,2004:719-724.
  • 3Molnar D,Wagner D.Privacy and security in library RFID:Issues,practices,and architectures[C]//In:Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 04),Washington,DC,USA,2004:210-219.
  • 4Juels A,Pappu R,Parno B.Unidirectional key distribution across time and space with applications to RFID security[C]//In 17th USENIX Security Symposium,2008:75-90.
  • 5Song B,Mitchell C J.Rfid authentication protocol for low-cost tags[C]//In WISEC,2008:140-147.
  • 6周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 7Dolev D,Yao A C.On the security of public key protocols[C]//Technical Report,Report No.STAN-CS-81-854,Standford,CA,USA,1981.

二级参考文献28

  • 1Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 2Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 3Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 4Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 5Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 6Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 7Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 8Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 9Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
  • 10Saito J,Ryou J.C,Sakurai K..Enhancing privacy of universal re-encryption scheme for RFID tags.In:Yang L.T,Guo M,Gao G.R,Jha N.K.eds..Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2004).Lectures Notes in Computer Science 3207.Berlin:Springer-Verlag,2004,879~890

共引文献209

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部