期刊文献+

融合安全与反碰撞的RFID处理机制 被引量:2

RFID Processing Mechanism Integrating Security and Anti-collision
下载PDF
导出
摘要 现有的RFID研究将RFID安全和RFID反碰撞看作2个不同的环节分别孤立地解决。针对该不足,将两者作为一个整体进行研究,采用的方法是将轻量级的随机密钥双向认证和动态时隙ALOHA协议进行融合。给出其处理机制流程,并和其他方法的性能进行对比分析。研究表明,该机制在保持对标签快速识别的同时,可抵抗包括重传、跟踪、阻断和篡改等多种攻击手段,具有较高的安全性和实用性。 Integrating RFID security and RFID anti-collision are research hotspots of RFID technology in the Internet of things.Its shortcoming is them being resolved as two different parts.This paper attempts to deal with them as a whole,with a strategy integrating lightweight random key double-authentication and dynamic slot-ALOHA protocol.The processing mechanism and performance comparison are given in this paper.The new mechanism not only maintains the advantage of rapid tag identification,but also has the ability to resist re-transmission attack,tracking-attack,blocking-attack,tampering-attack and so on.It has a high safety and practicality.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第10期26-28,共3页 Computer Engineering
基金 国家创新基金资助项目(09C26214415217) 广东省教育部产学研结合基金资助项目(2009B090300073) 广东省科技攻关基金资助项目(2009B090300073) 国家级大学生创新性实验计划基金资助项目([2009]47号)
关键词 RFID安全 RFID反碰撞 融合机制 双向认证 时隙ALOHA RFID security RFID anti-collision integration mechanism double authentication slot-ALOHA
  • 相关文献

参考文献6

二级参考文献44

共引文献95

同被引文献20

  • 1CHIEN H Y,CHEN C H. Mutual authentication protocol for RFID conforming to EPC Class1 Generation 2 standards[J].Computer Standards&Interfaces,2007,(02):254-259.
  • 2PUPUNWIWAT P,STANTIC B. A RFID explicit tag estimation scheme for dynamic framed-slot ALOHA anti-collision[A].Piscataway,NJ:IEEE Press,2010.1-4.
  • 3BASSIL R,EL-BEAINO W,KAYSSI A. A PUF-based ultralightweight mutual-authentication RFID protocol[A].Piscataway,NJ:IEEE Press,2011.495-499.
  • 4DUC D,PARK J,LEE H. Enhancing security of EPC global Gen-2 RFID tag against traceability and cloning[EB/OL].http://autoidlabs.org/uploads/media/AUTOID-LABS-WP-SWNET-016.pdf,2012.
  • 5CHO J-S,YEO S-S,KIM S-K. Securing against brute-force attack:a hash-based RFID mutual authentication protocol using a secret value[J].{H}Computer Communications,2011,(03):391-397.
  • 6RUHRMAIR U,MUNCHEN T,DROR G. Modeling attacks on physical unclonable functions[A].{H}New York:ACM Press,2010.237-249.
  • 7KLAIR D K,CHIN K W,RAAD R.A survey and tutorial of RFID anti-collision protocols[J].IEEE Communications Surveys&Tutorials,2010,12(3):400-421.
  • 8LAI Y C,HSIAO L Y,LIN B S.An RFID anti-collision algorithm with dynamic condensation and ordering binary tree[J].Computer Communications,2013,36(s17-18):1754-1767.
  • 9BUENO-DELGADO M V,VALES-ALONSO J,ANGERER C,et al.A comparative study of RFID schedulers in dense reader environments[C].IEEE International Conference on Industrial Technology,2010:1373-1378.
  • 10LEHPAMER H.RFID design principles,second edition[M].Automatic Vehicle Identification,2012.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部