期刊文献+

基于相互认证的移动RFID安全协议 被引量:3

Mobile RFID Cryptographic Protocol Based on Mutual Authentication
下载PDF
导出
摘要 移动RFID系统是指利用植入RFID读写芯片的智能移动终端,获取标签中的信息,并通过移动网络,访问后台数据库,获取相关信息。然而,由于移动RFID系统的无线通信环境和无可视性读写,带来了很多安全隐患,已经成为制约移动RFID发展的重要因素,针对此问题,在分析了移动RFID网络构成及其安全隐患后,提出了一种基于相互认证的安全协议,该协议引入了一个第3方服务器来为移动读写器和后台数据库提供签名密钥,并且利用椭圆曲线加密体制(ECC)对信息进行签名验证,最后分析表明该协议可以为移动读写器与后台数据库提供安全的通信环境,以应对各种攻击。 In a mobile RFID system, a smart mobile terminal, in which a chip of RFID reader is implanted, is used to acquire the information of the tag and access the background database through mobile network to get the relevant information. However, the wireless communication environment and invisibility of read and write bring many security risks which restrict the development of mobile RFID. To address these issues, the composition of mobile RFID network as well as its security risks are analyzed in the paper, and a cryptographic protocol based on mutual authentication is proposed. In this protocol, a third-party server is introduced to provide signature key for mobile reader and background database, and Elliptic Curve Cryptography (ECC) is used to sign and certify the information. Analysis shows that the protocol provides secure communication environment for mobile reader and background database to handle various attacks.
出处 《无线电通信技术》 2010年第1期40-43,共4页 Radio Communications Technology
基金 人事部留学人员科技活动择优资助项目(08ZD0106) 四川教育厅科技项目(2006A096)
关键词 移动RFID 相互认证 安全协议 数字签名 mobile RFID mutual authentication cryptographic protocol digital signature
  • 相关文献

参考文献7

二级参考文献17

  • 1[1]Koblitz N.Elliptic Curve Cryptosystems [ J ].Mathematics of Computation,1987,48(177):203-209.
  • 2[2]Blake I,Seroussi G,Smart N.Elliptic Curves in Cryptography [ M ].Cambridge,United Kingdom:Cambridge University Press,1999.
  • 3卢开澄.计算机密码学[M].北京:清华大学出版社,1998..
  • 4Myunghee Son,Yongjoon Lee,Cheolsig Pyo.Design and Implementation of mobile RFID technology in the CDMA networks.ICACT2006, pp. 1033-1036.Feb.20-22,2006.
  • 5EPCglobal.about the EPCglobal Network,http://www.epcglobalinc.com.
  • 6Divyan M.Konidala and Kwangjo Kim.Mobile RFID Application and Security Challenges.Proc. of SCIS 2007 pp.120-132, Jan. 23-26,2007.
  • 7Weiping Zhu Dong Wang Huanye Sheng.Mobile RFID Technology for Improving M-Commerce.ICEBE'05.2005 IEEE.
  • 8Hyangjin Lee,Jeeyeon Kim.Privacy threats and issues in Mobile RFID.ARES' 06.2006 IEEE..
  • 9Juhan Kim,Howon Kim.Security Vulnerability and Considerations in Mobile RFID environment. ICACT2006,pp.801-804.Feb.20-22,2006.
  • 10Tieyan Li,Robert Deng.Vulnerability Analysis of EMAP- An Efficient RFID Mutual Authentication Protocol. http://lasecwww.epfl.ch/-gavoine/rfid/.

共引文献68

同被引文献12

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部