期刊文献+

RFID系统可扩展安全认证协议研究 被引量:5

Research on the Scalable RFID Authentication Protocol
下载PDF
导出
摘要 提出了一种新的满足安全与隐私保护需求的高效率的RFID认证协议,并进行了性能评价和安全分析.该协议可以保护内容隐私、位置隐私,抵抗重放攻击和拒绝服务攻击,具备前向安全性和可扩展性. A new authentication protocol with high efficiency is proposed, the performance evaluation and security analysis is conducted. The protocol can protect content and location privacy, resist replay attack and denial-service-attack, with the forward security and scalability.
出处 《河北工业大学学报》 CAS 北大核心 2009年第5期1-5,共5页 Journal of Hebei University of Technology
基金 河北省科技攻关计划项目(07213508D) 河北省自然科学基金(F2008000117)
关键词 RFID 安全 隐私保护 协议 RFID security privacy preserving protocol
  • 相关文献

参考文献7

  • 1Weis S, Sarma S, Rivest R, et al. Security and privacy aspects of low-cost radio frequency identification systems [J]. Lecture Notes in Computer Science, 2003, 2802: 454-469.
  • 2Ohkubo M, Suzuki K, Kinoshita S. Cryptographic approach to privacy-friendly tags [A]. RFID Privacy Workshop [C]. MIT, Cambridge, MA, 2003.
  • 3Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [A]. Proceedings of the 2nd International Conference on Security in Pervasive Computing [C]. Springer, 2005. 70-84.
  • 4Chen Y, Chou J, Sun M. A novel mutual authentication sheme based on quadratic residues for RFID system [J]. Computer Networks, 2008, 52: 2373-2380.
  • 5Han S, Potdar V, Chang E. Mutual authentication protocol for RF1D tags based on synchronized secret information with monito [A]. International Conference on Computational Science and Its Applications [C]. Kuala Lampur: Springer, 2007.
  • 6Karthikeyan S, Nesterenko M. RFID security without extensive cryptography [A]. Proceedings of the 3rd ACM Workshop on Security of AdHoc and SensorNetworks [C]. USA: Alexandria, Virginia, 2005. 63-67.
  • 7Feldhofer M. An authentication protocol in a security layer for RFID smart tags [A]. IEEE Mediterranean Electrotechnical Conference [C]. Dubrovnik, Croatia, 2004. 759-762.

同被引文献37

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:101
  • 2Claude C, Gildas A. Noisy tags: a pretty good key exchange protocol for RFID tags (NTP). In: Proceedings of CARDIS 2006, LNCS 3928, 2006.
  • 3Chong H K, Gildas A. RFID distance bounding protocol with mixed challenges to prevent relay attacks. In: Proceedings of the 8th International Conference on Cryptology and Network Security, 2009.
  • 4Tsudik G. YA-TRAP: yet another trivial RFID authentication protocol. In: Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, Washington, 2006.
  • 5Molnar D, Soppera A, Wagner D. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Proc Workshop on Selected Areas in Cryptography, 2006.
  • 6Letri V, Burmester M, Medeirosde B. Universally composable and forward secure RFID authentication and authenticated key exchange. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, New York, 2007.
  • 7Chen Y, Chou J, Sun M. A novel mutual authentication sheme based on quadratic residues for RFID system.Computer Networks, 2008, 52(12).
  • 8Kim H S, Choi J Y. The design and verification of RFID authentication protocol for ubiquitous computing. In:Proceedings of the 18th International Conference on Database and Expert Systems Applications, September 2007.
  • 9Bellare M. Practice-oriented provable-security. In: Modern Cryptology in Theory and Practice, LNCS 1561, Berlin, Heidelberg:Springer-Verlag, 1999.
  • 10Bellare M, Rogaway P. Entity authentication and key distribution. In: Proc of the Advances in Cryptology--Crypto 93, LNCS 773, Berlin, Heidelberg: Springer-Verlag, 1993.

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部