期刊文献+

RFID标签的不可追踪性 被引量:6

Untraceability of RFID Tags
下载PDF
导出
摘要 为了形式化分析无线射频识别(RFID)协议中标签的不可追踪性,对串空间模型进行了扩展,引入了分析标签不可追踪性的能力,并给出了不可追踪性的判定定理.基于扩展的串空间模型,对Feldhofer协议和O′-FRAP协议进行了分析.结果表明,Feldhofer协议能实现不可追踪性,O′-FRAP协议对于主动攻击者不能实现不可追踪性. For formally analyzing untraceability of tags in radio frequency identification protocols,the strand space model is extended so that it can be applied to analyze untraceability.The theorems about untraceability are also given.Based on the extended strand space model,Feldhofer protocol and O'-FRAP protocol are analyzed.It shows that Feldhofer protocol is untraceable.On the contrary,O'-FRAP protocol is traceability for active attackers.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2010年第2期44-47,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60573036)
关键词 无线射频识别 标签 不可追踪性 串空间 协议 radio frequency identification tag untraceability strand space protocol
  • 相关文献

参考文献10

  • 1Juels A. RFID security and privacy: a research survey [J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) : 381-394.
  • 2Le T V, Burmester M, Medeiros B. Universally composable and forward secure RFID authentication and authenticated key exchange [ C ] Jj ASIACCS'07. New York: ACM Press, 2007: 242-252.
  • 3Cao T J, Bertino E. Security analysis of the SASI protocol [J]. IEEE Transactions on Dependable and Secure Computing, 2009, 6(1): 73-77.
  • 4Song B, Mitchell J C. RFID authentication protocol for low-cost tags [ C ] //WiSec'08. New York: ACM Press, 2008 : 140-147.
  • 5Chien H Y, Huang C W. Security of uhra-lightweight RFID authentication protocols and its improvements [ J ]. ACM Operating System Review, 2007, 41 (2) : 83-86.
  • 6Thayer F, Herzog J C, Guttman J D. Strand spaces: proving security protocols correct [ J]. Journal of Computer Security, 1999, 7(2): 191-230.
  • 7龙士工,罗文俊,袁超伟,李祥.串空间模型中的口令猜测攻击[J].北京邮电大学学报,2007,30(1):62-65. 被引量:3
  • 8Garcia F D, Hasuo I, Pieters W, et al. Provable anonymity[ C] ///FMSE. Virginia: IEEE Press, 2005: 63- 72.
  • 9Feldhofer M, Dominikus S, Wolkerstorfer J. Strong authentication for RFID systems using the AES algorithm [ C ] //CHES'04. Berlin: Springer-Verlag, 2004 : 357- 370.
  • 10Ouafi K, Phan R. Traceable privacy of recent provablysecure RFID protocols [ C ] // ACNS'08. New York: ACM Press, 2008: 479-489.

二级参考文献6

  • 1李莉,薛锐,张焕国,冯登国,王丽娜.基于口令认证的密钥交换协议的安全性分析[J].电子学报,2005,33(1):166-170. 被引量:15
  • 2沈海峰,薛锐,黄河燕,陈肇雄.串空间理论扩展[J].软件学报,2005,16(10):1784-1789. 被引量:16
  • 3Gavin Lowe.Analysing protocols subject to guessing attack[J].Journal of Computer Security,2004,12(1):83-98.
  • 4Tom Chothia.Guessing attacks in the pi-calculus with a computational justification[EB/OL].2005 (2005-03-15).http:∥citesteer.ist.psu.edu/722911.html.
  • 5Fabrega F J Thayer,Herzog J C,Guttman J D.Strand spaces:proving security protocols correct[J].Journal of Computer Security,1999,7(2/3):191-230.
  • 6Li Gong,Lomas T Mark A,Needham Roger M,et al.Protecting poorly chosen secrets from guessing attacks[J].IEEE Journal on Selected Areas in Communications,1993,11(5):648-656.

共引文献2

同被引文献58

引证文献6

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部