期刊文献+

一种改进的RFID物联网系统加密技术 被引量:1

下载PDF
导出
摘要 介绍了EPC物联网的发展和架构,并阐述了ONS系统在EPC物联网中的重要作用。最后,提出了一种基于变种DES加密算法的RFID标签数据安全传输方法。
作者 未有彬
出处 《软件导刊》 2011年第8期135-137,共3页 Software Guide
关键词 物联网 EPC ONS RFID
  • 相关文献

参考文献1

二级参考文献16

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2ITU Internet Reports 2005:The Internet of Things[EB/OL].(2005-11-06)[2010-05-20].http://bbs.cnttr.com/viewthread.php?tid=241077.
  • 3MEDAGLIA C M,SERBANATI A.An Overview of Privacy and Security Issues in the Internet of Things[C] //The Internet of Things:20th Tyrrhenian Workshop on Digital Communications,New York:Springer New York,2010:389-394.
  • 4USTUNDAG A.Standards.Security & Privacy Issues about Radio Frequency Identification (RFID)[J].Korkmaz,RFID Eurasia,2007:1-10.
  • 5SAVRY O,VACHERAND F.Security and Privacy Protection of Contacless Devices[M] //the Internet of Things:20th Tyrrhenian Workshop on Digital Communications,New York:Springer New York,2010:409-418.
  • 6GUNTHER O.Security challenges of the EPCglobal network Benjamin Fabian[J].Communications of the ACM,2009,7(52):121-125.
  • 7LOPEZ J.Wireless sensor network security[M].Canada,IOS Press,Inc:2008:1-200.
  • 8FREDERIX C.Internet of Things and radio frequency identification in care taking,facts and privacy[C] //Wireless Communication,Vehicular Technology,Infor-mation Theory and Aerospace & Electronics Systems Technology,2009:319-323.
  • 9Internet of Things-New security and privacy challenges[J].Computer Law & Security Review,2010(26):23-30.
  • 10LEUSSE D,PERIORELLIS P,DIMITRAKOS P,et al.Self Managed Security Cell,a Security Model for the Internet of Things and Services Advances in Future Internet[C] //2009 First International Conference on Digital Object Identifier,2009:47-52.

共引文献33

同被引文献14

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2刘振鹏,吴凤龙,尚开雨.基于TPM的云计算平台双向认证方案[J].通信学报,2012,33(22):20-24.
  • 3International Telecommunication Union. ITU Internet Re- ports 2005 : The Internet of Things [ R ]. 2005,73 ( 2 ) : 133- 137.
  • 4Gustavo R G, Mario M O, Carlos D K. Early infrastructure of an Internet of Things in Spaces for Learning [ C ] ff Eighth IEEE Internat-ional Conference on Advanced Learn- ing Technol-ogies. Santander, Cantabria: IEEE, 2008,27 (4) :381-383.
  • 5Amardeo C, Sarma, J G. Identities in the future internet of things [ J 1. Wireless Pers Commun,2009.49 : 353-363.
  • 6Yong Ki Lee, Sakiyama K, Batina L, et al. Elliptic curve based security processor for RFID [ J ]. IEEE Transactions on Computers ,2008,57( 11 ) : 1514-1527.
  • 7Tuyls P, Batina L. RFID tags for anticounterfeiting [ C ]// Proceedings the Cryptographers Trackat the RSA Confer- ence. Berlin : Springerer, 2006 : 115 - 131.
  • 8Cao X, Kou W, Du X. A pairing-free identity-based au- thenticated key agreement protocol with minimal message exchanges [ J ]. Information Sciences, 2010, 180 (15) : 2895-2903.
  • 9王保云.物联网技术研究综述[J].电子测量与仪器学报,2009,23(12):1-7. 被引量:745
  • 10吴学慧,牛志华,王潮.基于椭圆曲线密码的RFID安全协议[J].计算机工程与设计,2010,31(24):5165-5167. 被引量:10

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部