期刊文献+

基于Hash函数的RFID挑战-应答认证协议 被引量:8

RFID Challenge-Response Authentication Protocol Based on Hash Function
下载PDF
导出
摘要 介绍几种典型的射频识别安全隐私保护协议的方法,针对这些协议和一些文献中提出的改进协议中的不足提出一种新的基于Hash函数的改进方案,该方案可以有效地抵御非法读取、位置跟踪、窃听、伪装哄骗和重放等不安全问题,并适用于标签数目和阅读器数目较多的情况,具有较好的安全性和高效性。 This paper introduces several typical methods to against security and privacy problems,and aim at the shortages in them and other improved ones which provided by some literatures,proposes a new improved scheme based on hash function.The modified scheme resists illegal access,tracking,eavesdropping,impersonation and replay attack,fits for the case which the tags and readers number is large and is security and efficiency.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第24期156-157,161,共3页 Computer Engineering
基金 国家自然科学基金资助项目(10876029)
关键词 射频识别 安全隐私 HASH函数 Radio Frequency Identification(RFID) security and privacy Hash function
  • 相关文献

参考文献5

  • 1袁署光,戴宏跃,赖声礼.基于Hash函数的RFID认证协议[J].计算机工程,2008,34(12):141-143. 被引量:18
  • 2Zhang Lan, Zhou Huaibei, Kong Ruoshan. An Improved Approach to Security and Privacy of RFID Application System[C]//Proc. of Wireless Communications, Networking and Mobile Computing Conference. Wuhan, China:[s. n.], 2005:1195-1198.
  • 3欧阳麒,蒋兴浩,孙锬锋.一种基于相互认证的安全RFID系统[J].信息安全与通信保密,2006,28(12):142-144. 被引量:14
  • 4Osaka K, Takagi T. An Efficient and Secure RFID Security Method with Ownership Transfer[C]//Proc. of Conf. on Computational Intelligence and Security. Guangzhou, China: [s. n.], 2006: 1090- 1095.
  • 5Tsudik G. YA-TRAP: Yet Another Trivial RFID Authentication Protocol[C]//Proceedings of International Conference on Pervasive Computing and Communications. Washington D. C., USA: [s. n.], 2006: 640-643.

二级参考文献9

  • 1蒋文娟.RFID存在的隐私问题及应用建议[J].计算机安全,2005(10):21-22. 被引量:14
  • 2[2]Melanie R Rieback,Bruno Crispo,Andrew S Tanenbaum.The Evolution of RFID security.Pervasive Computing IEEE,2006,5:62-69.
  • 3[3]Ari Juels.RFID Security and Privacy:A Research Survey.IEEE Journal on Selected Areas in Communications,2006,24,(2),381-394.
  • 4[5]Weis S A,Sarma S E,Rivest R L,et al.Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems.Security in Pervasive Computing.First International Conference,2004,2802(201-12):201-212.
  • 5[6]Gao Xingxin(Grace),Xiang Zhe(Alex),Wang Hao,et al.An Approach to Security and Privacy of RFID System for Supply Chain.Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business,2004,(14):164-168.
  • 6Osaka K, Takagi T. An Efficient and Secure RFID Security Method with Ownership Transfer[C]//Proc. of Computational Intelligence and Security. Guangzhou, China: [s. n.], 2006: 1090-1095.
  • 7Hun-Wook K, Shu-Yun L, Hoon-Jae L. Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security[C]//Proc. of Conference on Hybrid Information Technology. Cheju Island, Korea: [s. n.], 2006: 718-723.
  • 8Zhang Lan, Zhou Huaibei, Kong Ruoshan. An Improved Approach to Security and Privacy of RFID Application System[C]//Proc. of Wireless Communications, Networking and Mobile Computing Conference. Wuhan, China: [s. n.], 2005: 1195-1198.
  • 9Dimitriou T. A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks[C]//Proc. of Conference on Security and Privacy for Emerging Areas in Communications Networks. Athens, Greece: [s. n.], 2005: 59-66.

共引文献30

同被引文献64

引证文献8

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部