期刊文献+

基于EPC标准的认证及所有权转移协议 被引量:2

Authentication and ownership transfer protocol based on EPC standard
下载PDF
导出
摘要 针对现有的EPC协议的弱点,提出一种基于EPC标准的认证及所有权转移协议。该协议可以通过较低的成本实现隐私保护、匿名通信、完整性检验、所有权转移等特点。分析发现,该协议可以有效抵御跟踪、重发、克隆、假冒、离线字典等多种攻击方式。 According to the weakness of present EPC protocols,a protocol based on EPC standard is proposed.Privacy protection,anonymous communication,integrity checking and ownership transfer will be implemented with low cost in this protocol.Analysis shows that the proposed protocol can efficiently withstand trace,replay,clone,imitation,off-line dictionary attacks.
作者 尹平 李群祖
出处 《电子设计工程》 2012年第2期38-41,共4页 Electronic Design Engineering
关键词 RFID EPC 认证 所有权转移 协议 低成本 RFID EPC authentication ownership transfer protocol low cost
  • 相关文献

参考文献10

  • 1Yang M H. Lightweight authentication protocol for mobile RFID networks[J]. International Journal of Security and Networks, 2010,5(1) :53-62.
  • 2Ayoade J. Security implications in RFID and authentication processing framework[J]. Computer & Security, 2006,25 (3) : 207 -212.
  • 3Shunzo Tateishi. EPC and Applications of RFID[J]. Presentation Solution, 2006 (3) : 28-37.
  • 4刘亚东.基于EPC C1G2的匿名双向认证协议研究[J].通信技术,2011,44(4):135-137. 被引量:2
  • 5Pedro Peris-Lopez,Julio Cesar Hemandez-Castro,et al. LAMEDA PRNG for EPC Class-1 Generation-2 RFID specification[J]. Computer Standards & Interfaces, 2009 (31 ) : 88-97.
  • 6Dixit V,Verma H K,Singh A K. Comparison of various security protocols in RFID[J]. International Journal of Computer Applications, 2011,24 (7) : 17-21.
  • 7Chien H Y,Chen C H. Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards[J]. Computer Standards and Interfaces, 2007 (29) : 254-259.
  • 8Yeh T C, Wang Y J, Kuo T C, et al. Securing RFID systems conforming to EPC Class 1 Generation 2 standard [J]. Expert Systems with Applications,2010(37):7678-7683.
  • 9Habibi M H,Alagheband M R. Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard [C]//WISTP, LNCS 6633,2011: 254-263.
  • 10uh G E,Devadas S. Physically Unclonable Functions for Device Authentication and Secret Key Generation[C]//Procee- dings of the 44th Annual Design Automation Conference,New York: ACM Press, 2007: 9-14.

二级参考文献4

共引文献1

同被引文献19

  • 1杜治国,杨波,欧阳国帧,等.安全的RFID认证协议研究设计[J].计算机工程和设计,2009,30(3):561-565.
  • 2Lee K. A Two-Step Mutual Authentication Protocol Based on Randomized Hash - Lock for Small RFID Networks [ C ]// Proc. of 2010 Fourth International Conference on Network and System Security. Melbourne : [ s. n. ] ,2010:527-533.
  • 3Ha J,Moon S,Nieto J M G,et al. Low-Cost and Strong-Secu- rity RFID Authentication ProtoeolEJl. IFIP International Fed- eration for Information,2007,48 (9) :795-807.
  • 4Chien Hung-Yu, Huang Chenwei. A Lightweight Authentica- tion Protocol for Low-Cost RFID[ J]. JournM of Signal Pro- cessing Systems,2010,59 ( 1 ) :95-102.
  • 5Phan R C W. Cryptanalysis of a New Ultralightweight RFID Authentication Protocol-SASI [ J]. IEEE Transactions on De- pendable and Secure Corsputing,2009,6(4) :316-320.
  • 6Rizomiliotis P, Rekleitis E. Security Analysis of the Song- Mitchell Authentication Protocol for Low-cost RFID Tags[ J ]. IEEE Communications Letters,2009,13(4) :274-276.
  • 7Yoon Eun-Jun,Yoo Kee-Young. Two Security Problerss of RFID Security Method with Ownership Transfer[ C ]//Proc. of IFIP International Conference on Network and Parallel Com- puting. China,Shanghai : [ s. n. ] ,2008:68-73.
  • 8Erguler I, Anarim E. Attacks on an Eificient RFID Authentica- tion Protocol [ C ]//Proc. of lOth IEEE International Confer- ence on Computer and Information Technology. Bradford : [ s. n. ] ,2010:1065-1069.
  • 9Kang Soo-Young,Lee Im-Yeong. A Study on New Low-Cost RFID System with Mutual Authentication Scheme in Ubiqui- tous[ C l//Prec, of IEEE International Conference on Multi- media and Ubiquitous Engineering. Busan: [ s. n. ] ,2008:527 -530.
  • 10丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592. 被引量:93

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部