期刊文献+

一种基于Hash函数的RFID安全认证方法 被引量:7

A Security RFID Authentication Method Based on Hash Function
下载PDF
导出
摘要 近年来,射频识别(RFID)技术得到越来越多的应用,随之而来的是各种RFID安全问题。对现有的基于Hash函数的RFID认证协议进行分析,针对现有技术存在的不足,提出了一种基于Hash函数的低成本的RFID双向安全认证方法,该方法只需要进行一次Hash函数计算,且加入了标签ID动态更新机制,通过在后台数据库中存储旧的标签ID解决同步问题,与现有技术相比具有一定的优越性。 In recent years, radio frequency identification (RFID) has been widely used, which causes a lot of security and privacy problems. After analyzing current RFID security authentication methods based on hash function, a low-cost RFID mutual authentication method based on hash function is proposed according to deficiencies of current methods. In this method, Hash function is operated only once and the tag's ID can be refreshed dynamically. To solve the synchrony problem the old ID of tags are also stored in back-end database. Compared with current RFID authentication methods, the method proposed in this paper performs better.
作者 钱萍 吴蒙
出处 《电信科学》 北大核心 2011年第10期109-112,共4页 Telecommunications Science
基金 国家重点基础研究发展计划("973"计划)资助项目(No.2011CB302903) 江苏省普通高校研究生创新工程资助项目(No.CXZZ11_0404)
关键词 射频识别 隐私安全 双向认证 radio frequency identification, privacy security, mutual authentication
  • 相关文献

参考文献7

  • 1Ohkubo, Suzuki K, Kinoshita S. RFID privacy issues and technical challenges. Communications of the ACM, 2005, 48(9): 66-71.
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 3Sarma S, Weis S A, Engels D W. RFID systems security and privacy implications. In:Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES2002), Berlin,Springer-Verlag, 2003.
  • 4Weis S A, Sarma S, Rivest R, et al. Security and privacy aspects of low-cost radio frequency identification systems.In:The 1st International Conference on Security in Pervasive Computing, Volume 2802 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, 2004.
  • 5Ohkubo M, Suzuki K, Kinoshita S. Hash-chain based forward secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS2004),Sendai,2004.
  • 6Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment. In: Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005), Lectures Notes in Computer Science 3450,Berlin,Springer-Verlag, 2005.
  • 7Henrici D, Muller P. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04), Washington DC, USA, 2004.

二级参考文献28

  • 1Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 2Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 3Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 4Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 5Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 6Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 7Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 8Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 9Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
  • 10Saito J,Ryou J.C,Sakurai K..Enhancing privacy of universal re-encryption scheme for RFID tags.In:Yang L.T,Guo M,Gao G.R,Jha N.K.eds..Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2004).Lectures Notes in Computer Science 3207.Berlin:Springer-Verlag,2004,879~890

共引文献209

同被引文献84

引证文献7

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部