期刊文献+

基于EPC物联网的公安数据通信安全认证协议研究 被引量:1

Research on the Security Authentication Protocol of Data Communication Based on EPC Internet of Things
下载PDF
导出
摘要 随着EPC物联网的出现和应用,为公安情报信息获取提供了新的平台,有效地延伸和拓展了公安情报信息采集的时间和空间,但EPC物联网中更加复杂的信息实体对公安数据的管理及安全性提出了极高的要求。文章针对这种现状,在综合分析了大量安全协议的基础上,提出了一个适用于低成本标签的并且满足可扩展性的安全认证协议,即一个基于假名的可扩展的RFID安全认证协议,通过利用后端数据库的存储空间降低后端数据库搜索标签的次数和计算次数,不仅保护用户数据隐私,而且优化后端数据库标签假名的更新,实现了可扩展性。 With the appearance and application of the EPC Internet of things, for the public security information acquisition provides a new platform, effectively and extend the public security information acquisition time and space, but EPC Internet of things in more complex information entity of public security data management and security challenges. This article in view of this situation, in a comprehensive analysis of a large number of security protocol based on, puts forward a suitable for low cost tag and satisfy extensible authentication protocol, namely the one based on the pseudonym of scalable RFID security authentication protocol, through the use of a back-end database storage space and reduce the number of back-end database search tags and calculation of frequency, not only to protect the privacy of user data, and optimization of the back-end database label pseudonym update, achieving scalability.
出处 《信息网络安全》 2011年第12期20-23,共4页 Netinfo Security
基金 江苏省公安厅科研项目[201008007]
关键词 EPC物联网 攻击者模型 安全认证协议 internet of things attacker model security authentication protocol
  • 相关文献

参考文献12

  • 1张国胜.物联网技术在公安系统的应用研究[J].数字通信,2010,37(4):37-40. 被引量:16
  • 2Lu L, HanJ, Hu L, Liu Y and Ni L. Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems[C]. Fifth IEEE International Conference on Pervasive Computing and Communications, 2007.
  • 3Wang W, Hu L and Lu L. Storage-Awareness: RFID Private Authentication based on Sparse Tree[C] in Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, 2007.
  • 4Lu L, Han J, Xiao R and Liu Y. ACTION: Breaking the Privacy Barrier for RFID Systems[C]INFOCOM 2009. The 28th IEEE Conference on Computer Communications., 2009.
  • 5Avoine G, Oechslin P. RFID Traceabihty: A MulUlayer Problem[C]. In Financial Cryptography-FC' 05, set. Lecture Notes in Computer Science, A. Patrick and M. Yung, Eds., vol. 3570, IFCA.Roseau, The Commonwealth Of Dominica: Springer-Verlag, February-March 2005:125-140.
  • 6Molnar D and Wagner D. Privacy and security in library RFID[C]. 11th ACM conference on Computer and communications security, 2004.
  • 7Avoine G, Dysli E and Oechslin P. Reducing time complexity in RFID systems[J]. Selected Areas in Cryptography-SAC, 2005, vol. 3897:291-306.
  • 8Yao Q, Qi Y, Han J, Zhao J, Li X and Liu Y. Randomizing RFID private authentication[C]. In IEEE International Conference on Pervasive Computing and Communications-PerCom' 09. IEEE'Computer Society, 2009. 1-10.
  • 9Song B and Mitchell C J. RFID Authentication Protocol for Low-cost Tags[C]. In ACM Conference on Wireless Network Security, WiSed 08, 2008.
  • 10Weis S, Sarma S, Rivest R and Engels D. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems[C]. In International Conference on Security in Pervasive Computing-SPC 2003, 2003.

二级参考文献5

  • 1马晓东.五年内建立中国物联网[EB/OL].http://tech. 163.com/09/1019/00/5LU RR7M K000915 BE.html, 2009-10-19.
  • 2王坤.国内外物联网技术研究进展[EB/OL].http://www.51emb.com/2009/1201/3876.html.
  • 3HALLER S,KARNOUSKOS S,SCHROTH C.The Internet of Things in an Enterprise Context[M].Berlin Heidelberg:Springer-Verlag,2009:228-239.
  • 4SARMA A C,GIRAO J.Identities in the Future Internet of Things[J].Wireless Pers Commun,2009(49):353-363.
  • 5石军.“感知中国”促进中国物联网加速发展[J].通信管理与技术,2009(5):1-3. 被引量:105

共引文献15

同被引文献28

  • 1International Telecommunication Union UIT. ITU Intemet Reports 2005 : The Internet of Things[ EB/OL]. http ://www. itv. int/dms-pvb/itv-s/ s-Pol-IR. IT-2005.
  • 2Amardeo C, Smrma. G. Identities in the Future Intemet of Things[ J]. Wireless Pers Commun,2009, 49 (5) : 353 - 363.
  • 3Gustavo G, Mario O, Carlos K. Early infrastructure of an Interuet of Things in Spaces for Learning[ C]. Eighth IEEE International Conference on Advanced Learning Technologies, 2008 : 381-383.
  • 4Xiong Li, Zhou Xuan, Liu Wen. Research on the Architecture of Trusted Security System Based on the Internet of Things[ C ]. 2011 Fourth In- ternational Conference on Intelligent Computation Technology and Automation, 2011:1172-1175.
  • 5Sungmin Hong, Daeyoung Kim, Minkeun Ha, et al. SNAIL: an IP-based wireless sensor network approach to the inernet of things[ C]. IEEE Wireless Communications, 2010:34-42.
  • 6Sachin Babar, Antonietta Stango, Neeli Prasad et al. Proposed Embedded Security Framework for Intemet of Things (IoT) [ C ]. The 2nd Inter- national Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology ( Wireless VITAE), 2011:1-5.
  • 7Kary Framling, Jan Nyman. The compromise between Security and Usability in the Internet of Things [ C ]. Proceedings of Adavanced Production Management Systems (APMS) ,2008 : 15-17.
  • 8Junwei Lv, Xiaohu Yuan, Haiyan Li. A New Clock Synchronization Architecture of Network for Internet of Things [ C ]. International Conference on Information Science and Technology, 2011 : 685-688.
  • 9Benjamin Fabian. Implementing Secure P2P-ONS[ C ]. IEEE International Conference on Communications, 2009:1-5.
  • 10S Misra, PV Krishna, H Agarwal et al. A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things [ C ]. IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing, 2011:114-122.

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部