期刊文献+

基于RFID的EPC标签安全问题研究 被引量:1

Research on Security Issues of EPC Tag Based on RFID
下载PDF
导出
摘要 EPC(Electronic Product Code:产品电子代码)概念的提出源于射频识别技术和计算机网络技术的发展。EPC的载体是射频识别(RFID)电子标签。与传统条形码相比,EPC标签具有扫描速度快、体积小、易封装、可抵抗污染、可重复使用、穿透性强、存储容量大等优势。随着EPC标签在安全领域中的普遍应用,出现了越来越多的风险。文章考查了美国护照卡(Passport Card)和华盛顿州"增强型驾驶证"(Washington State Enhanced Drivers Licenses,WA EDL),测试了这两类证件的多重弱点,并提出了一种改进的KBA算法,克服了使用EPC销毁指令来获取标签身份认证所面临的实际挑战。 The conception of electronic product code is based on the development of radio frequency identification and computer network technology,whose carrier is RFID tag.Compared with barcode,EPC tag has advantages of high scanning rate,small volume,easy to package,resistance to dirtiness,reusability,good penetrability and large storage.With the increasingly common use of EPC tag for security applications.,more and more risks arise.The paper examines the united states Passport Card and Washington State "enhanced drivers license"(WA EDL),and measures multiple weaknesses.The paper offers a improved KBA algorithm,overcoming practical challenges in the EPC "kill" command to achieve tag authentication.
出处 《计算机与数字工程》 2012年第1期90-92,113,共4页 Computer & Digital Engineering
关键词 产品电子代码 射频识别 认证 复制 护照卡 EPC RFID authentication cloning passport card
  • 相关文献

参考文献16

  • 1EPCglobal Inc. Class 1 generation 2 UHF air interface protocol standard version 1.1.0. Referenced 2008 at http://www, epc- globalinc, org/standards/uhfclg2/uhfclg2 _ 1 _ 1 _ 0 standard- 20071017. pdf.
  • 2Bureau of Consular Affairs United States Department of State. Western hemisphere travel initiative(whti) overview,2008.
  • 3Washington State Department of Licensing. FAQ: eDL/ID, 2008. Referenced 2008 at http://www, dol. wa. gov/driverslicense/edlfaq, html.
  • 4New York to over enhanced driver's license Newsday, 16 September 2008. Referenced October 2008 athttp://www, news- day. com/services/newspaper/printedition/tuesday/news/nynylice165845220sep16,0,5665783, print, story.
  • 5Read range for Gen2 RFID in 2008? 40 feet. RFID Update, 14 August 2008. Rderenced 2008 at http://www, r? dupdate. com/articles/index, php? id=1656.
  • 6J. Westhues. Hacking the prox card. In S. Garfinkeland 13. Rosenberg, editors, RFID: Applications, Security, and Priva- cy, pages 291 300 Addison-Wesley,2005.
  • 7Marco Gruteser, Dirk Grunwald. A methodological assessment of location privacy risks in wireless hotspot networks. In First International Conference on Security in Pervasive Computing, 2003:10-24.
  • 8S. Bono, M. Green, A. Stubble? eld, et al. Security analysis of a cryptographically-enabled RFID device In P. McINnieh editor, 14th USENIX Security Symposium, USENIX, 2005 : 1-16.
  • 9K. Nohl, D. Evans, Starbug, H. PI? otz. Reverse-engineer ing a cryptographic RFID tag. In USENIX Security, 2008 : 185- 193.
  • 10F. D. Garcia, P. van Rossum, R. Verdult, et al. Schreur. Wirelessly pickpocketing a Mifare Classic card. In IEEE Sym- posium on Security and Privacy (S&P 2009), IEEE, 2009:3- 15.

同被引文献13

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部