期刊文献+

基于hash运算的RFID认证协议分析和改进 被引量:13

Analysis and improvement of hash-based RFID authentication protocol
下载PDF
导出
摘要 针对已有基于hash运算的RFID认证协议所面临的安全问题,提出了一种新的适合低成本RFID的双向认证协议,并与已有的协议进行安全性分析和性能比较。结果表明该协议仅使用hash函数和异或操作,就达到机密性、完整性和防追踪性的安全目标,并运用时间戳作为标签查询标志,提高认证过程的执行性能。因此该协议与先前工作相比,更适合低成本的RFID系统。 Analysis of existing hash-based RFID authentication protocols' deficiency in security and privacy,this paper proposed an improved two-way authentication protocol for low-cost RFID system,and compared with the existed ones on analysis of security and performance.As only hash function and bitwise XOR operation are required to be computed by tags,and used time stamp for index query to improve the performance of query for tag information stored in database,so the proposed strategy is very suitable for low-cost RFID system compared with previous works.
出处 《计算机应用研究》 CSCD 北大核心 2011年第11期4311-4314,共4页 Application Research of Computers
基金 国家"863"计划资助项目(2008AA04A107)
关键词 射频识别 安全协议 认证 哈希运算 协议的安全性 RFID(radio frequency identificaion) security protocol authentication hash algorithm security of protocol
  • 相关文献

参考文献6

  • 1中国国家科技部会.中国射频识别(RFID)技术政策白皮书[EB/OL].http://www.eet-china.tom/ARTICLES/2006JUN/PDF/CHINARFIDWHITEPAPER.PDF,2006-06-09.
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 3SARMA S E, WEISS A, ENGLES D W. Radio frequency identification: secure risks and challenges [ J ]. RSA Laboratories Cryptobytes, 2003, 6(1) :2-9.
  • 4SEIS A, SAIMA S E, RIVEST R L. Security and privacy aspects of low cost radio frequency identification system [ C ]//Proc of the 1 st International Conference on Security in Pervasive Computing. Berlin Springer-Verlag, 2004 : 201 - 212.
  • 5MOINAR D, WAGNER D. Privacy and security in library RFID: issues, practices, and architectures[ C ]//Proc of the 11 th ACM Conference on Computer and Communication Security. New York:ACM, 2004:210-219.
  • 6LEE S M, HWANG Y J, LEE D H,et al. Efficient authentication for low cost RFID system [ C ]//Proc of the International Conference on Computational Science and Its Applications. Berlin: Springer-Verlag, 2005:619-627.

二级参考文献28

  • 1Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 2Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 3Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 4Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 5Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 6Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 7Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 8Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 9Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
  • 10Saito J,Ryou J.C,Sakurai K..Enhancing privacy of universal re-encryption scheme for RFID tags.In:Yang L.T,Guo M,Gao G.R,Jha N.K.eds..Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2004).Lectures Notes in Computer Science 3207.Berlin:Springer-Verlag,2004,879~890

共引文献209

同被引文献104

引证文献13

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部