期刊文献+

基于RFID技术的分布式密钥安全保护机制 被引量:2

A RFID-Based Security Protection Mechanism with Distributed Cryptographic Keys
下载PDF
导出
摘要 文章主要基于RFID技术,实现分布式密钥安全保护机制。文章将密钥拆分成不同的子密钥存储到不同的标签上,通过扫描多个分布式便携电子标签,来获取密钥,在保证密钥安全的同时实现了个性化的终端解锁方式。由于标签具有便携性,所以终端用户可以将其随身携带。由于该机制不改变硬件结构和协议内容,实现方便,成本低廉,有十分光明的应用前景,未来可扩展到其他物联网应用场景下。 This paper is based on the RFID technology, implementing a sort of security protection mechanism with distributed cryptographic keys. We split a cryptographic key into different cryptographic sub-keys stored in different electronic tags. We get the original key by scanning several distributed and portable electronic tags. While guaranteeing the security of a cryptographic key, we implement an individual method to unlock the terminal. Because of the portability of electronic tags, terminal users can carry these tags with themselves. As our widget is implemented easily and cheaply without changing the hardware struct and protocol content, it has a bright application prospect and is extensible to other application field of Internet of things.
出处 《信息网络安全》 2012年第11期52-55,共4页 Netinfo Security
基金 中央高校基本科研业务费专项资金[0800219164] 本科生科研能力训练项目[0800219187]
关键词 RFID 便携电子标签 分布式密钥 个性化解锁 RFID portable electronic tags distributed cryptographic key individual unlocking
  • 相关文献

参考文献6

  • 1ITU, ITU Internet Reports 2005: The Internet of Things[R].
  • 2Lu Yan. The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems[M]. Auerbach Publications, 2008.
  • 3Rieback M,Crispo B,Tanenbaum A.RFID guardian:A battery- powered mobile device for RFID privacy management[C].Proc of 10th Australasian Conf on Information Security and Privacy (ACISP 2005). Berlin:Springer,2005:184-194.
  • 4Juels A,Rivest R,Szydlo M.The blocker tag:Selective blocking of RFID tags for consumer privacy[C].Proe of the 8th ACM Conf on Computer and Comm SecuriW. New York:ACM,2003:103-111.
  • 5Jasmin Blanchette, Mark Summerfield.C++ GUI Programming with Qt 4 (2nd Edition)[M]. Prentice Hall,2008.
  • 6DouglasR.Stinson密钥学原理与实践(第三版)[M].冯登国等译.北京:电子工业出版社.2009.

同被引文献21

  • 1徐文.电子标签(RFID)技术在档案管理中的应用[J].航天制造技术,2012(4):18-21. 被引量:1
  • 2张淑芬,陈学斌,刘春风.RSA公钥密码体制的安全性分析及其算法实现[J].计算机应用与软件,2005,22(7):108-110. 被引量:21
  • 3胡美燕,刘然慧.DES算法安全性的分析与研究[J].内蒙古大学学报(自然科学版),2005,36(6):693-697. 被引量:21
  • 4彭皓,李泉林.RFID隐私与安全中的关键技术研究[D].2006国际RFID技术高峰论坛会论文集,2006.
  • 5WEISS A. RFID (radio frequency applications[J]. System, 2007, 2:7 16.
  • 6SARMA S E, WE1S S A, ENGELS D W. RFII) systems and security and privacy implications[C]//4th International Workshop Redwood Shores. CA, USA, 2003: 454-469.
  • 7Inoue S, Yasuura H. RFID privacy using user-controllable tmiqueness[C]//RFID Privacy Workshop. 2003: 1-9.
  • 8JUELS A. Minimalist cryptography for low-cost RFID tags[C]// Security in Conmmnication Networks. Springer Berlin Heidelberg, 2005: 149-164.
  • 9JUELS A. RFID security and privacy: A research survey[J].Selected Areas in Communications, IEEE Journal on, 2006, 24(2): 381-394.
  • 10QIAN C, NGAN H, LIU Y, et al. Cardinality estimation for large- scale R.FID systems[J]. Parallel and Distributed Systems, IEEE Transactions on, 2011, 22(9): 1441-1454.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部