期刊文献+

RFID安全认证协议HSAP的分析及改进 被引量:2

Analysis and Improvement of RFID Security Authentication Protocol HSAP
下载PDF
导出
摘要 随着RFID系统应用的不断扩大,RFID的安全问题也越来越受到人们的关注,基于Hash Lock的RFID安全协议以其低成本的优势得到了广泛的应用,但其安全性能尚不完善。在分析已有的Hash Lock安全协议的基础上,提出了一种基于HSAP的改进协议,通过对其分析可知,改进的协议IHSAP能够保证内容隐私、防止位置跟踪攻击、防止会话劫持攻击、抵抗重放攻击、防止假冒攻击,是一种性能较好的协议,在实际的环境中有一定的实用价值。 With the growing application of RFID systems, more and more attention are paid to RFID security issues. Hash-based RFID security protocol has been widely used due to its low-cost ,but its safety performance is not perfect.The paper presents an improved security authentication protocol IHSAP based on the analysis of the existing security protocol and this protocol can prevent many threats including contents privacy,location tracing,replay attack,spoofing attack ere.So it is a better security protocol in performance, and it has some practical value in the actual environment.
作者 张文丽
出处 《智能计算机与应用》 2012年第5期78-80,共3页 Intelligent Computer and Applications
关键词 射频识别 HASH函数 认证协议 Radio Frequency Identification Hash Function Authentication Protocol
  • 相关文献

参考文献11

  • 1SARMA S E,WEISS A,ENGELS D W. RFID systems and security and privacy implications.KALISKI B S,KOC C K,PAAR C[A].Berlin:Spnng-Verlag,2003.454-469.
  • 2SARMA S E,WEISS A,ENGELS D W. Radio frequency identification:secure risks and challenges[J].RSA Laboratories Crypto bytes,2003,(01):2-9.
  • 3WEISS A,SARMA S E,RIVEST R L. Security and privacy aspects of low-cost radio frequency identification systems[A].Berlin:Springer-Verlag,2004.201-212.
  • 4OHKUBO M,SUZUKI K,KINGSHIPS S. Hash-chain based forward-secure privacy protection scheme for low-cost RFID[A].Sendai,Japan,2004.719-724.
  • 5HENRICI D,MULLER P. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers[A].Washington,DC:USA,2004.149-153.
  • 6MOLNAR D,WAGNER D. Privacy and security in library RFID:issues,practices,and architectures[A].Washington,DC:USA,2004.210-219.
  • 7RHEE K,KWAK J,KIM S. Challenge-response based RFID authentication protocol for distributed database environment[A].Beilin:Springer-Verlag,2005.70-84.
  • 8LEE S M,HWANG Y J,LEE D H. Efficient authentication for low-cost RFID systems[A].Berlin,Germany,2005.619-627.
  • 9ZHANG Lan;ZHOU Huaibei;KONG Ruoshan.An improved approach to security and privacy of RFID application system[A]湖北武汉,20051195-1198.
  • 10袁署光,戴宏跃,赖声礼.基于Hash函数的RFID认证协议[J].计算机工程,2008,34(12):141-143. 被引量:18

二级参考文献8

  • 1Osaka K, Takagi T. An Efficient and Secure RFID Security Method with Ownership Transfer[C]//Proc. of Computational Intelligence and Security. Guangzhou, China: [s. n.], 2006: 1090-1095.
  • 2Hun-Wook K, Shu-Yun L, Hoon-Jae L. Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security[C]//Proc. of Conference on Hybrid Information Technology. Cheju Island, Korea: [s. n.], 2006: 718-723.
  • 3Zhang Lan, Zhou Huaibei, Kong Ruoshan. An Improved Approach to Security and Privacy of RFID Application System[C]//Proc. of Wireless Communications, Networking and Mobile Computing Conference. Wuhan, China: [s. n.], 2005: 1195-1198.
  • 4Dimitriou T. A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks[C]//Proc. of Conference on Security and Privacy for Emerging Areas in Communications Networks. Athens, Greece: [s. n.], 2005: 59-66.
  • 5高磊,盛焕烨.RFID应用系统中的Tag-reader安全通信协议[J].计算机工程,2007,33(21):128-129. 被引量:8
  • 6Lee S.Mutual authentication of RFID system using syn-chronized secret information[]..2005
  • 7Weis S.Security and privacy in radio frequency identification device[]..2003
  • 8陈克力,郭春生.一种双层/双向认证的随机Hash锁RFID安全协议[J].电子技术应用,2008,34(11):129-132. 被引量:3

共引文献21

同被引文献9

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部