期刊文献+

无后台服务器的射频识别标签安全查询协议 被引量:1

Server-less Radio Frequency Identification Tag Secure Searching Protocols
下载PDF
导出
摘要 在许多射频识别(RFID)应用中,经常需要在多个标签中确定某个特定标签是否存在。在这种环境下,标签查询协议必不可少。然而,已有的协议要么存在安全漏洞,要么查询效率低下。利用Hash函数和时间戳,提出一个无后台服务器的RFID标签查询协议。GNY逻辑被用于证明新协议的正确性。分析显示提出的协议可以高效的实现特定标签的查询,且能够抵抗一些主要攻击,实现对标签隐私的保护。 Radio Frequency IDentification (RFID) tag search protocols are used in a situation where an reader finds a specific tag among multiple tags, which play important roles in many RFID applications. However, the existing protocols either have security weaknesses or exhibit poor efficiency. In this paper, a server-less RFID tag secure search protocol is proposed, which utilizes hash function and timestamp. GNY logic is used to prove its correctness. Analysis shows that presented protocol can be used to search a particular tag efficiently, and preserve tag's privacy against all major attacks.
出处 《电子与信息学报》 EI CSCD 北大核心 2012年第11期2582-2586,共5页 Journal of Electronics & Information Technology
基金 北京邮电大学青年科研创新计划专项(BUPT2011RC0212) 国家自然科学基金(60972077 61070204 61003285)资助课题
关键词 射频识别 查询协议 GNY逻辑 追踪攻击 Radio Frequency IDentification (RFID) Search protocol GNY logic Track attack
  • 相关文献

参考文献11

  • 1Tan C C, Sheng B, and Li Q. Secure and serverless RFID authentication and search protocols[J]. IEEE Transactions on Wireless Communications, 2008, 7(4): 1400-1407.
  • 2Kulseng L, Yu Z, Wei Y, et al.. Lightweight secure search protocols for low-cost RFID systems[C]. Proceedings of the 29th IEEE International Conference on Distributed Computing Systems, IEEE Computer Society, Washington, DC, USA, 2009: 40-48.
  • 3Chao L, Li H, Ma J F, et al.. Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems [J]. International Journal of Radio Frequency Identification Technology and Applications, 2012, 1(4): 3-12.
  • 4Kim Z, Kim J, Kim K, et al.. Untraceable and serverless RFID authentication and search protocols[C]. 2011 Ninth IEEE International Symposium on Busan, Parallel and Distributed Processing with Applications Workshops (ISPAW), Montreal, Canada, 2011: 278-283.
  • 5Lin I C, Tsaur S C, and Chang K P. Lightweight and server- less REID authentication and search protocol [C]. Proceedings of the 2009 Second International Conference on Computer and Electrical Engineering, IEEE, New York, 2009 2: 95-99.
  • 6Lee C F, Chien H Y, and Laih C S. Server-less RFID authentication and searching protocol with enhanced security [J]. International Journal of Communication System, 2012, 25(3): 376-385.
  • 7Zuo Y J. Secure and private search protocols for RFID systems[J]. Information System Front, 2010, 12(5): 507-519.
  • 8曹峥,邓淼磊.通用可组合的RFID搜索协议[J].华中科技大学学报(自然科学版),2011,39(4):56-59. 被引量:8
  • 9Hoque M E, Rahman F, and Ahamed S L. S-search: finding RFID tags using scalable and secure search protocol[C]. Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, 2010: 439-443.
  • 10Yoon H S and Youm H Y. An anonymous search protocol for RFID systems[J]. Journal of Convergence Information Technology, 2011, 8(6): 44-50.

二级参考文献4

共引文献7

同被引文献16

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:104
  • 2SARMA S, WEIS S, ENGELS D.RFID systems and security and privacy implications[C]//Proc of the 4th International Workshop on Cryptographic Hardware and Embedded Systems.Berlin:Springer,2002:454-469.
  • 3WEIS S A, SARMA S E, RIVEST R L.Security and privacy aspects of low-cost radio frequency identification systems[C]//Proc of the 1st Conference on Security in Pervasive Computing.Berlin:Springer,2003:201-212.
  • 4OHKUBO M, SUZUKI K, KINOSHITA S.Hash-chain based forward-secure privacy protection scheme for low-cost RFID[C]//Proc of Symposium on Cryptography and Information Security.Berlin:Springer,2004:719-724.
  • 5LEE S M, HWANG Y J, LEE D H.Efficient authentication for low-cost RFID systems[C]//Proc of International Conference on Computational Science and Its Applications.Berlin:Springer,2005:619-627.
  • 6HENRICI D, MAULLER P.Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers[C]//Proc of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops.Los Alamitos:IEEE Computer Society,2004.
  • 7TSUDIK G.YA-TRAP:yet another trivial RFID authentication protocol[C]//Proc of the 4th IEEE International Conference on Pervasive Computing and Communications Workshops.2006:640-643.
  • 8TAN C C, SHENG Bo, LI Qun.Secure and severless RFID authentication and search protocols[C]//Proc of the 5th Annual IEEE International Conference on Pervasive Computing and Communications.New York:IEEE Press,2007:24-29.
  • 9LIN I C, TSAUR S C, CHANG Kai-ping.Lightweight and serverless RFID authentication and search protocol[C]//Proc of the 2nd International Conference on Computer and Electrical Engineering.[S.l.]:IEEE Press,2009:95-99.
  • 10LV Chao, LI Hui, MA Jian-feng, et al.Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems[J].International Journal of Radio Frequency Identification Technology and Applications,2012,1(4):3-12.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部