期刊文献+

一种改进的RFID认证协议分析 被引量:1

Analysis of An Improved RFID Authentication Protocol
下载PDF
导出
摘要 RFID系统的无线传输特性使其在通信过程中易遭受外界的攻击和窃取,为此人们采取了诸如物理方法和认证加密方法来增强系统的安全性,而认证加密方法由于其设计简便得到了人们的青睐。本文针对常用的基于Hash函数的认证协议存在的安全漏洞进行分析,在此基础上提出一种改进的协议。通过将改进的协议与常用的协议在安全性、数据存储状况和算法复杂度方面进行对比,证明改进的认证协议对RFID系统的整体性能,尤其是安全性方面有很好的改善。 The wireless transmission characteristics of RFID system is vulnerable to be attacked and theft within communication,to people adopt the physical methods and authentication encryption methods to enhance system security,authentication encryption methods is more useful due to its simple design.In this paper,we analysis of security vulnerabilities exist in the commonly used authentication protocol based on Hash function,on this basis bring forward a modified protocol.Through compare them in security,data storage condition and complexity of the algorithm,it can prove that the improved protocol has a very good improvement for RFID system's overall performance,particularly in security.
机构地区 北京理工大学
出处 《微计算机信息》 2010年第32期127-128,145,共3页 Control & Automation
基金 基金申请人:刘岩 项目名称:RFID应用中的通信测试技术研究 基金颁发部门:中华人民共和国科学技术部(2006AA04A106)
关键词 RFID 认证协议 安全性 数据存储 算法复杂度 RFID Authentication Protocol Security Data Storage Algorithm complexity
  • 相关文献

参考文献5

二级参考文献82

  • 1陈香,薛小平,张思东.标签防冲突算法的研究[J].现代电子技术,2006,29(5):13-15. 被引量:40
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 3李浩,谢桂海,王新锋,杨磊.一种基于零知识证明的RFID鉴别协议[J].现代电子技术,2006,29(17):23-25. 被引量:3
  • 4吴永祥.射频识别(RFID)技术研究现状及发展展望[J].微计算机信息,2006(11Z):234-236. 被引量:118
  • 5Avoine Gildas, Oechslin Philippe. RFID traceability: a multilayer problem[C].Roseau, Dominica: The 9th International Conference on Financial Cryptography, 2005:125-140.
  • 6Weis A Stephen. Security and privacy in radio frequency identification devices [D]. Cambridge, MA: Master's Thesis of Massachusetts Institute of Technology, 2003.
  • 7Henrici Dirk, MAuller Paul.Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers[C].IEEE International Workshop on Pervasive Com- puting and Communication Security,2004:149-153.
  • 8Dimitriou Tassos.A lightweight RFID protocol to protect against traceability and cloning attacks[C]. The Conference on Security and Privacy for Emerging Areas in Communication Networks-SecureComm, 2005:137-145.
  • 9Hwang Young Ju,Lee Dong Hoon,Lee Su-Mi,et al.Eficient authentication for low-cost RFID systems [C]. International Conference on Computational Science and its Applications, 2005:619- 627.
  • 10Molnar David, Wagner David. Privacy and security in library RFID: issues, practices, and architectures[C]. ACM Conference on Computer and Communications Security,2004:210-219.

共引文献141

同被引文献5

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部