期刊文献+

基于RFID的供应链系统安全性分析

Analysis of Risks Existing in the RFID Networks
下载PDF
导出
摘要 依据保密性、完整性、可用性对RFID网络中存在的风险进行了分析,对相应的对策的效果做了一个整体评估。如果不能对标签进行访问控制,对查询服务进行很好的设计,将会导致大量风险。 In this paper,we first analyses the risks of RFID networks based on confidentiality,integrity,availability.Then we make a generation evaluation of the outcome of each measure.Uncontrolled access to the tags and low-quality design of inquiring services will lead to many risks.
出处 《物流科技》 2010年第1期68-71,共4页 Logistics Sci-Tech
基金 上海市教委资助项目 项目编号:06DZ008
关键词 供应链 RFID 安全 风险 supply chain RFID security risk
  • 相关文献

参考文献12

  • 1吕强.RFID重塑集成供应链[EB/OL].(2007-11-21)[2009-07-15].http://www.china-b.com/jyzy/qygl/20090317/934273-1.html.
  • 2Roberti, M. 5-Cent Breakthrough[EB/OL]. (2006-05-01)[2009-09-15]. http://www.rfidjourna|.cotn/article/articleview/2295/1/128/.
  • 3EPCglobal. The EPCglobal Architecture Framework[EB/OL]. (2005-07-10)[2007-09-15]. http://www.epcglobalinc.org/standards/.
  • 4Gunther. O, Spiekermann. S. RFID and the Perception of Control[J]. The Consumer's View. Commun. ACM, 2005,48(9):73-76.
  • 5Thompson, D R, N Chaudhry, C W Thompson. RFID security threat model[C]//Conference on Applied Research in Information Technology. Conway, Arkansas, 2006.
  • 6Alfaro, J G, Barbeau, M, Kranakis E. Security threats on EPC based RFID systems[C]//5th International Conference on Information Technology: New Generations. Information Security and Privacy track, IEEE Computer Society, 2008.
  • 7EPCglobal. EPCglobal Standards Overview[EB/OL]. (2008-03-15)[2009-09-15]. http://www.epcglobalinc.org/standards/.
  • 8Y. Oren, A. Shamir. Power analysis of RFID tags[C]//Rump session of Advances in Cryptology, CRYPTO' 2006[2009 -07-15]. http://www.wisdom.weizmann.ac.il/_yossio/rfid/.
  • 9Kaminsky, D. Explorations in Namespace: White-hat Hacking across the Domain Name System. Commun[J]. ACM, 2006,49 (6):62-69.
  • 10Dingledine R, Mathewson N, Syverson P. The Second Generation Onion Router[Z]. 13th USENIX Security Symposium In Proceedings of the 13th USENIX Security Symposium, 2004:303-320.

二级参考文献38

  • 1Sarma S, Weis S, Engels D. White paper: RFID systems, security and privacy implications. Auto-ID Center, MIT:Technical Report MIT-AUTOID-WH-014, 2002
  • 2Juels A, Weis S A. Defining strong privacy for rfid//Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'07). Washington, DC, USA, 2007:342-347
  • 3Burmester M, Le T, Medeiros B. Provably secure ubiquitous systems: Universally composable RFID authentication protocols//Proceedings of the Conference on Security and Privacy in Communication Networks (SECURECOMM). Baltimore, Maryland, USA, 2006:1-9
  • 4Li Y, Ding X. Protecting rfid communications in supply chains//Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security ( ASIACCS' 07). Singapore, 2007:234-241
  • 5Sarma S, Weis S, Engels D. Radio-frequency identification systems//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems. San Francisco, USA, 2002:454 -469
  • 6Juels A. RFID security and privacy: A research survey. Journal of Selected Areas in Communication (J-SAC), 2006, 24(2) : 381-395
  • 7Juels A, Rivest R L, Szydlo M. The blocker tag: Selective blocking of RFID tags for consumer privacy//Proceedings of the 8th ACM Conference on Computer and Communications Security(CCS). Washington DC, USA, 2003:103-111
  • 8Weis S A, Sarma S E, Rivest R L, Engels D W. Security and privacy aspects of low-cost radio frequency identification systems//Proceedings of the International Conference on Security in Pervasive Computing--SPC 2003, Lecture Notes in Computer Science 2802. Boppard, Germany, Springer-Verlag, 2003:201-212
  • 9Ohkubo M, Suzuki K, Kinoshita S. Efficient hash-chain based RFID privacy protection scheme//Proceedings of the International Conference on Ubiquitous Computing--Ubicomp, Workshop Privacy: Current Status and Future Directions. Nottingham, England, Springer-Verlag, 2004
  • 10Tsudik G. YA-TRAP: Yet another trivial RFID authentication protoeol//Proceedings of the International Conference on Pervasive Computing and Communications-- PerCom 2006. Pisa, Italy, 2006:640-643

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部