期刊文献+

基于混合加密方法的RFID安全认证协议 被引量:5

RFID Security Authentication Protocol Based on Hybrid Encrypting Approach
下载PDF
导出
摘要 无线信号的广播传输、资源受限等特点使RFID技术存在潜在安全隐患。为此,将公钥加密算法与对称密钥加密算法有机地结合,提出一种新的RFID安全认证协议,该协议解决了RFID系统中的信息泄露、重传攻击、位置追踪、假冒攻击、去同步化等安全与隐私问题。对该协议的安全性和性能进行比较分析,结果表明该协议可以为RFID系统提供较好的安全性,适合于RFID系统的应用。 Wireless transmission, broadcast of signals, resource-constraint, etc bring some potential risks. This paper proposes a new mutual authentication protocol for RFID system. The protocol combines commendably public key encryption and symmetric cryptosystem for challenge-response based authentication. It can prevent many security problems including information leakage, replay attack, location tracing, spoofing attack, etc. The paper compares and analyzes the security and performance of the protocol, result shows that the protocol has more security for RFID system, it can be applied to RFID system.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第1期134-136,共3页 Computer Engineering
关键词 认证协议 哈希函数 标签 阅读器 安全性 authentication protocol Hash function tag reader security
  • 相关文献

参考文献6

  • 1Ngai E W T, Moon K K L. An Academic Literature Review (1995-2005) and Future Research Directions[J]. International Journal of Production Economics, 2008, 112(2): 510-520.
  • 2Chien Hung-Yu, Chen Che-Hao. Mutual Authentication Protocol for RFTD Conforming to EPC Class 1 Generation 2 Standards[J]. Computer Standards & Interfaces, 2007, 29(2): 254-259.
  • 3白煜,滕建辅,张立毅,郭继昌.基于Hash锁的同步强化RFID验证协议[J].计算机工程,2009,35(21):138-139. 被引量:12
  • 4Kang S Y, Lee D G, Lee I Y. A Study on Secure RFID Mutual Authentication Scheme in Pervasive Computing Environment[J]. Computer Communications, 2008, 31 (18): 4248-4254.
  • 5Li Xuefeng, Enjian B, Xie Yinghua. A Novel Authentication Protocol with Soundness and High Efficiency for Security Problems[C]//Proc. of the 4th International Conference on Wireless Communications, Networking and Mobile Computing. Dalian, China: IEEE Press, 2008: 1-3.
  • 6Chen Yalin, Chou Jue-Sam, Sun Hungmin. A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems[J]. Computer Networks, 2008, 52(12): 2373-2380.

二级参考文献8

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 3Juels A. RFID Security and Privacy: A Research Survey[J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2): 381-394.
  • 4Ohkubo M, Suzuki K, Kinoshita S. Cryptographic Approach to "Privacy-friendly" Tags[C]//Proc. of RFID Privacy Workshop. Cambridge, MA, USA: [s. n.], 2003: 77-83.
  • 5Sarma S, Weis S, Engels D. RFID Systems and Security and Privacy Implications[C]//Proc. of Workshop on Cryptographic Hardware and Embedded Systems. [S. l.]: Springer, 2002: 454-469.
  • 6Lee S M, Hwang Y J, Lee D H. Efficient Authentication for Low-cost RFID Systems[C]//Proc. of the International Conference on Computational Science and Its Applications. Berlin, Germany: [s. n.], 2005: 619-627.
  • 7Dimitriou T. A Lightweight RFID Protocol to Protect Against Traceability and Cloning attacks[C]//Proe, of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks. Athens, Greece: [s. n.], 2005: 59-66.
  • 8李章林,卢桂章,辛运帏.基于Hash链的可扩展RFID验证协议[J].计算机工程,2008,34(4):173-175. 被引量:7

共引文献11

同被引文献51

  • 1李斌,蒋卫寅,凌力.一种基于Key值更新的RFID安全协议设计[J].微型电脑应用,2011(7):15-18. 被引量:2
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3杨世平,李祥.BAN逻辑在协议分析中的密钥猜测分析缺陷[J].计算机工程,2006,32(9):126-127. 被引量:4
  • 4佟晓筠,艾广平,姜伟,周广禄.基于Rijndael算法的数据加密与签名技术实现[J].微处理机,2007,28(2):80-82. 被引量:2
  • 5Miles S B, Sarma S E, Williams J R. RFID Technology and Applications[M]. New York, USA: Cambridge University Press, 2008.
  • 6Weis S, Sarma S, Rivest R, et al. Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems[C] //Proc. of the 1st International Conference on Security in Pervasive Computing. Boppard, Germany: [s. n.] , 2003.
  • 7Chen Yalin, Chou Jue-Sam, Sun Hung-Min. A Novel Mutual- authentication Scheme Based on Quadratic Residues for RFID Systems[J]. Computer Networks, 2008, 52(12): 2373-2380.
  • 8Yeh Tzu-Chang, Wu Chien-Hung, Tseng Yuh-Min. Improvement of the RFID Authentication Scheme Based on Quadratic Residues[J]. Computer Communications, 2011, 34(3): 337-341.
  • 9Forouzan B A. 密码学与网络安全[M]. 马振晗, 贾军保, 译. 北京: 清华大学出版社, 2009.
  • 10SARMA S E, WEISS A, ENGELS D W, RFID systems and securi- ty and privacy implications [ C]// Proceedings of the 4th Interna- tional Workshop on Cryptographic Hardware and Embedded Sys- tems. Berlin: Springer, 2002:454-469.

引证文献5

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部