期刊文献+

一种能抵抗拒绝服务攻击的RFID安全认证协议 被引量:7

New defending RFID authentication protocol against DoS attacks
下载PDF
导出
摘要 在分析现有一些RFID认证协议的基础上,采用流密码加密和密钥动态更新的方法设计了一种能抵抗拒绝服务攻击的RFID安全认证协议。对该协议的安全性和性能进行了分析,结果表明协议能够有效防止拒绝服务攻击、隐私攻击、窃听攻击、重传攻击,同时解决了RFID的隐私问题。 By analyzing some existing RFID authentication protocols,this paper proposed a new mutual authentication protocol,which was based on the use of symmetric encryption and dynamic update key to prevent the denial-of-service attack.Then discussed the security and performance of this protocol.The result shows that this protocol has provided good security for RFID system,and can defeat location privacy attack,relay attack,eavesdropping attack,denial-of-service attack,and solve problems of RFID security privacy.
出处 《计算机应用研究》 CSCD 北大核心 2012年第2期676-678,682,共4页 Application Research of Computers
关键词 射频识别 安全协议 拒绝服务 相互认证 RFID security protocol denial-of-service(DoS)attack mutual authentication
  • 相关文献

参考文献13

  • 1LAURIE A. Practical attacks against RFID[ J]. Network Security, 2007(9) :4-7.
  • 2YUKIYASU T,TERUO S,TOMOYASU S,et al. Cryptanalysis of DES implemented on computers with cache [ C ]//Proc of the 5 th Interna- tional Workshop on Cryptographic Hardware and Embedded Systems. [ S. 1. ] :Springer-Verlag,2003:62-76.
  • 3SARMA S,WEIS S,ENGELS D. RFID systems, security and privacy implications, MIT-AUTOID-WH-014 [ R ]. [ S. 1. ] : Auto-ID Center, MIT, 2002.
  • 4JUELS A, RIVEST R L, SZYDLO M. The blocker tag : selective bloc- king of RFID tags for consumer privacy [ C ]//Proc of ACM Confe- rence on Computer and Communications Security. 2003 : 103-111.
  • 5周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 6GARFINKEL S L,JUELS A,PAPPU R. RFID privacy: an overview of problems and proposed solutions [ J]. IEEE Security & Privacy Magazine ,2005,3 ( 3 ) :34-44.
  • 7JUELS A. RFID security and privacy: a research survey[ J]. IEEE Journal on Selected Areas in Communications, 2004,24 ( 2 ) : 381-394.
  • 8KIRN H S,OH J H, CHOI J Y. Analysis of the RFID security proto- col for secure smart home network [ C ]//Proc of lntenmtional Confe- rence on Hybrid Information Technology. 2006:356-363.
  • 9DIMITRIOU T. A light weight RFID protocol to protect against tracea- bility and cloning attacks [ C ]//Proc of the I st International Confer- ence on Security and Privacy for Emerging Areas in Communication Networks. 2005 : 137-145.
  • 10LET V,BURNMESTER M, De MEDEIROS B. Universally compos- able and forward secure RFID authentication and authenticated key exchange[ C ]//Proc of the 2nd ACM Symposium on hfformation, Comouter and Communications Security. 2007 : 242-252.

二级参考文献40

  • 1http://www.rfid.com.cn/chinese/product/dianxyy.htm
  • 2P.R.Foste,R.A.Burberry:Antenna problems in RFID system,IEEE Colloquium on RFID Technology,pp.3-1-3-5,25 Oct.1999
  • 3M.Kim,T.Takeuchi,N.Y.Chong:A 3-axis Orthogonal Antenna for Indoor Localization,Int.Workshop on Networked Sensing Systems,59-62,2004
  • 4RFID Privacy Workshop,IEEE SECURITY & PRIVACY,MARCH/APRIL 2004,p48-50.
  • 5Lionel M.Ni,Yunhao Liu,Yiu Cho Lau and Abhishek P.Patil:LANDMARC:Indoor Location Sensing Using Active RFID,Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03) 2003
  • 6F.Zhou,C.Chen,D.Jin,C.Huang,and H.Min,"Evaluating and Optimizing Power Consumption of Anti-Collision Protocols for Applications in RFID systems," ISLPED'04,Newport Beach,California,USA,August 2004.
  • 7http://www.ccw.com.cn/news2/secure/htm2003/20030828-13T9U.htm
  • 8Xingxin Gao,Zhe Xiang,Hao Wang,Jun Shen,Jian Huang,Song Song:AN APPROACH TO SECURITY AND PRIVACY OF RFID SYSTEM FOR SUPPLY CHAIN,Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business.2004
  • 9Gildas Avoine and Philippe Oechslin:A Scalable and Provably Secure Hash-Based RFID Protocol,Proceedings of the 3rd Int'l Conf.on Pervasive Computing and Communications Workshops,2005
  • 10http://www.cnca.net/cs/knowledge /basic/g405.html

共引文献224

同被引文献49

  • 1章轶,刘皖,陈琳.基于Hash函数的RFID认证协议改进设计[J].微计算机信息,2008,24(11):214-216. 被引量:4
  • 2李莉,刘建伟.RFID安全保密技术研究进展[J].信息安全与通信保密,2007,29(8):165-167. 被引量:9
  • 3R Forno,W Feinbioom.PKI:A Ouestion of Trust andVaiue[J].Communications of the ACM,2001,44(6):78-80.
  • 4Li T L, Jin Z G, Pang C Y. Secured ownership transfer scheme for low-cost RFID tags [C] //Proc of the 3rd Interna- tional Conference on Intelligent Networks and Intelligent Sys- tems, 2010: 584-587.
  • 5Song B, Chris J Mitchell. Scalable RFID security protocols supporting tag ownership transfer [J]. Computer Communica- tions, 2011, 34 (4): 556-566.
  • 6Chen C L, Chien C F. An ownership transfer scheme using mobile RFIDs [J]. Wireless Personal Communications, 2013, 68 (3): 1093-1119.
  • 7Ching Y N, Susilo W, YI M Practical RFID ownership transfer scheme [J]. Journal of Computer Sma'ity, 2011, 19 (2): 319-341.
  • 8Yang M H, Hu H Y. Protocol for ownership transfer across authorities: With the ability to assign transfer target [J]. Se- curity and Communication Networks, 2012, 5 (2): 164-177.
  • 9Hoque M E, Raham F, Ahamed S I. Enhancing privacy andsecurity of RFID system with serverless authentication and search protocols in pervasive environments [J]. Wireless Per- sonal Cornmunications, 2010, 55 (1): 65-79.
  • 10Zou Y J. Chaging hands together: A .secure group ownership transfer protocol for RFID tags [C] //Proc of the 43rd Hawaii International Conference on System Sciences, 2010: 1-10.

引证文献7

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部