期刊文献+

EPCGen2标准下安全的RFID认证协议 被引量:5

Secure RFID Authentication Protocol for EPCGen2
下载PDF
导出
摘要 现有的许多无线射频识别(RFID)协议或者不符合EPC Class-1 Gen-2(EPCGen2)标准的要求,或者存在某种安全隐患。通过对RFID协议安全需求的讨论,以及对近来提出的符合EPCGen2标准的安全协议的分析,提出了符合EPCGen2标准的RFID认证协议的设计原则,设计了一个新的符合EPCGen2标准的RFID认证协议。新的协议满足双向认证、匿名、不可追踪、抗假冒攻击、抗重放攻击等安全需求。 Many of the existing protocols for radio frequency identification (RFID) either do not conform to the EPC Class-1 Gen-2 (EPCGen2) standards or suffer from security flaws. Safety requirements for RFID protocols were discussed and recently proposed EPCGen2 compliant cryptographic protocols were analyzed, and the design principles of EPCGen2 compliant authentication protocols were given. A new RFID authentication protocol based on the EPCGen2 standards was also proposed. The new protocol provides mutual authentication, anonymity, untraceability, anti-impersonation attack and anti-replay attack.
出处 《计算机科学》 CSCD 北大核心 2010年第7期115-117,共3页 Computer Science
基金 河南省科技攻关计划项目(102102210432)资助
关键词 无线射频识别 认证协议 攻击 安全 Radio frequency identification, Authentication protocol, Attack, Security
  • 相关文献

参考文献10

  • 1EPC Class 1 Gen 2 standard[OL].http:∥www.epcglobalinc.org/standards/uhfc1g2/.
  • 2Duc D C,Park J,Lee H,et al.Enhancing security of EPC global Gen-2 RFID tag against traceability and cloning[C] ∥The 2006 Symposium on Cryptography and Information Security.Hiroshima:ACM Press,2006:269-277.
  • 3Chien H Y,Chen C H.Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards[J].Compu-ter Standards & Interfaces,2007,26(2):254-259.
  • 4Cai Q L,Zhan Y J,Wang Y H.A minimalist mutual authentication protocol for RFID system & BAN logic analysis[C] ∥ISECS International Colloquium Computing,Communication,Control,and Management.Guangzhou:IEEE Press,2008:449-453.
  • 5Choi E Y,Lee D H,Lin J.Anti-cloning protocol suitable to EPC global Class-1 Generation-2 RFID systems[J].Computer Standards & Interfaces,2009,31(6):1124-1130.
  • 6Seo D H,Baek J M,Cho D S.Secure RFID authentication scheme for EPC Class Gen2[C] ∥International Conference on Ubiquitous Information Management and Communication.Suwon:IEEE Press,2009:221-227.
  • 7Sun H M,Ting W C.A Gen2-based RFID authentication protocol for security and privacy[J].IEEE Transactions on Mobile Computing,2009,8(1):1-11.
  • 8张辉,侯朝焕,王东辉.一种基于部分ID的新型RFID安全隐私相互认证协议[J].电子与信息学报,2009,31(4):853-856. 被引量:18
  • 9Burmester M,Munilla J.A flyweight RFID authentication protocol[OL].http:∥eprint.iacr.org/2009/212.pdf.
  • 10Rotter P.A framework for assessing RFID system security and privacy risks[J].Pervasive Computing,2008,7(4):70-77.

二级参考文献11

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2蔡庆玲,詹宜巨,史斌宁.一种符合EPC C1G2标准的RFID随机化密钥双向认证协议[J].电信科学,2007,23(4):70-74. 被引量:4
  • 3Klaus F. RFID Handbook: Radio-Frequency Identification Fundamentals and Applications in Contactless Smart Cards and Identification[M]. Second Edition, West Sussex, England John Wiley & Sons Ltd, 2003: 341-393.
  • 4广东电子工业研究院.RFID研究动态.http://www.gdeii.com.cn/Technique/Technique?_content.jsp?id=38,2005.
  • 5Garfinkel S L, Juels A, and Pappu R. RFID privacy: An overview of problems and proposed solutions[J]. IEEE Security & Privacy Magazine, 2005, 3(3): 34-44.
  • 6Juels A. RFID security and privacy: A research survey[J]. IEEE Journal on Selected Areas in Communications, 2004, 24(2): 381-394.
  • 7Dimitriou T. A lightweight RFID protocol to protect against traceability and cloning attacks[C]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Athens, Greece, September 2005: 59-66.
  • 8Duc D C, Park J, Lee H, and Kim K. Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning[C]. The 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan, January 17-20, 2006 269-277.
  • 9Chien H Y and Chen C H. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards[J]. Computer Standards & Interfaces, 2006, 26(2): 254-259.
  • 10Li Yong-Zhen, Jeong Yoon-Su, Sun Ning, and Lee Sang-Ho. Low-cost authentication protocol of the RFID system using partial ID[C]. Proceedings of 2006 International Conference on Computational Intelligence and Security. Guangzhou, China, November 3-6, 2006, 2: 1221-1224.

共引文献17

同被引文献52

  • 1SARMA S E, WEISS A, ENGELS D W. RFID systems and securi- ty and privacy implications [ C]// Proceedings of the 4th Intenla- tional Work-shop on Cryptographic Hardware and Embedded Sys- tems, LNCS 2523. Berlin: Springer-Verlag, 2003 : 454 - 469.
  • 2SARMA S E, WEISS A, ENGELS D W. Radio-frequency identifi- cation: secure risks and challenges [ J]. Laboratories Cryptobytes, 2003,6(1): 2-9.
  • 3WEISS A, SARMA S E, RIVEST R L. Security and privacy as- pects of low-cost radio frequency identification systems [ M]. Berlin: Springer-Verlag, 2005:201-212.
  • 4PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, TAPIADOR J M E, et al. Weaknesses in two recent lightweight RFID authentication protocols [ C]//Proceedings of Inscrypt'2009, LNCS 6151. Berlin: Springer-Verlag, 2009:383 - 392.
  • 5HWU J S, CHEN R J, LIN Y B. An efficient identity-based crypto- system for end-to-end mobile security [ J]. IEEE Transactions on Wireless Communications, 2006,5(9) : 2586 -2593.
  • 6KRISTIN E L, KATHERINE E S. The elliptic curve discrete log- arithm problem and equivalent hard problems for elliptic divisibility sequences [ EB/OL]. [ 2011 -03 - 10]. http://eprint, iacr. org/ 2008/099. pdf.
  • 7SARMA S E,WEIS S A,ENGELS D W.RFID systems and securi-ty and privacy implications[C]//Proceedings of CHES'02 RevisedPapers from the 4th International Workshop on Cryptographic Hard-ware and Embedded Systems.London:Springer-Verlag,2003:454-469.
  • 8SARMA S E,WEIS S A,ENGELS D W.Radio-frequency identifi-cation:Secure risks and challenges[J].RSA Laboratories Crypto-Bytes,2003,6(1):2-9.
  • 9WEIS S A,SARMA S E,RIVEST R L.Security and privacy as-pects of low-cost radio frequency identification systems[C]//Securi-ty in Pervasive Computing,LNCS 2802.Berlin:Springer-Verlag,2004:201-212.
  • 10EPCglobal.The EPCglobal architecture framework[S/OL].[2011-11-06].http://www.epcglobalinc.org/standards/architec-ture/architecture_1_3-framework-20090319.pdf.

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部