期刊文献+

一种基于Hash的RFID双向认证的安全协议 被引量:1

An improved RFID mutual authentication protocol based on Hash function
原文传递
导出
摘要 对RFID技术所面临的安全问题进行分析,结合当前RFID认证协议的优缺点,提出了一种基于Hash函数的RFID双向认证的协议.协议采用随机数与动态ID结合的双向动态认证,通信认证过程加密.与同类型协议对比分析表明,该协议可以有效抵御非法读取、位置跟踪和重放等安全问题,同时能够满足标签低成本的需求,并且有着更优的执行性能. Based analysis of the security issues of RFID technology, integrated advantages and disadvantages of the current RFID system authentication protocol, a new mutual authentication RFID protocol based Hash function was proposed. The protocol adopted mutual dynamic authentication with random number and dynamic ID, communication authentication progress in encryption. Compared with the same type of RFID protocol, it shows that the protocol can be effective against unauthorized read - out, location tracking, replay, and can meet the low - cost needs of tags with a better performance.
作者 谢永 章义来
出处 《湖南科技大学学报(自然科学版)》 CAS 北大核心 2012年第4期73-77,共5页 Journal of Hunan University of Science And Technology:Natural Science Edition
基金 国家科技支撑计划课题(2012BAH25F02) 国家科技支撑计划课题(2013BAF02B01)
关键词 RFID HASH 双向认证 协议 RFID Hash mutual authentication protocol
  • 相关文献

参考文献15

  • 1Frank T, Chris L, Brad H, et al. RFID Security [ M ]. Waltham : United States : Syngress Publishing, Inc. 2007.
  • 2Weis S A, Sarma S E. Security and privacy aspects of low - cost radio frequency identification systems [ C ]// Proceeding of the 1 st Security in pervasive Computing. Berlin :Springer- Verlag, 2003.
  • 3李辉,侯义斌,黄棒钦,何福贵,陈锐.基于FPGA的防伪阅读器[J].计算机工程,2008,34(21):35-37. 被引量:4
  • 4张宏壮,王建民.RFID中的安全隐私问题及策略分析[J].微计算机信息,2008,24(18):47-49. 被引量:13
  • 5Sarma S E, Weis S A, Engles D W. Radio frequency identification : secure risks and challenges [ J ]. RSA Laboratories Cryptobytes, 2003,6(1) : 2-9.
  • 6Seis A, Saima S E, Rivest R L. Security and privacy aspects of low cost radio frequency identification system [ C ] //Proceeding of the 1st international conference on security in pervasive computing. Berlin : Springer - Verlag, 2004.
  • 7Ohkubo M, Suzuki K. Hash - chain based forward secure privacy protection scheme for low - cost RFID [ C ] // Proceedings of the 2004 symposium on cryptography and information security (SCIS2004). Sendai, Japan : Petersens, 2004.
  • 8Duc D, Park J, Lee H, et al. Enhancing security of EPC global Gen - 2 RFID tag against traceability and cloning [ C ] //Proceeding of the 2006 symposium on cryptography and information security. Hiroshima, Japan : Institute of Electronics, Information and Communication Enaineers. 2006.
  • 9Chien H, Chen C. Mutual authentication protocol for RFID conforming to EPC Classl Generation 2 standards [ J ]. ComputerStandards& Interfaces, 2007, 29(2): 254-259.
  • 10Lira C, Kwon T. Strong and robust RFID authentication enabling perfect ownership transfer [ C ] // Proceeding of international conference on information and communications security. Berlin: Springer - Verlag, NCS 4307, 2006.

二级参考文献23

  • 1杨海东,杨春.RFID安全问题研究[J].微计算机信息,2008,24(8):238-240. 被引量:34
  • 2郭俐,王喜成.射频识别(RFID)系统安全对策技术研究的概述[J].网络安全技术与应用,2005(9):23-25. 被引量:11
  • 3蒋文娟.RFID存在的隐私问题及应用建议[J].计算机安全,2005(10):21-22. 被引量:14
  • 4吴永祥.射频识别(RFID)技术研究现状及发展展望[J].微计算机信息,2006(11Z):234-236. 被引量:119
  • 5Weinstein R. RFID: A Technical Overview and Its Application to the Enterprise[J]. IT Professional, 2005, 7(3): 27-33.
  • 6Flores J L M. A Performance of RFID Tags in Near and Far Field[C]//Proc. of ICPWC'05. New Delhi, India: [s. n.], 2005.
  • 7Geilen M C W. Formal Techniques for Verification of Complex Real-time Systems[D]. Eindhoven, Netherlands: Eindhoven University of Technology, 2002.
  • 8Vogt H. Multiple Object Identification with Passive RFID Tags[C]// Proceedings of the IEEE International Conference on Systems, Man and Cybernetics. Yasmine Hammamet, Tunisia: [s. n.], 2002.
  • 9KARTHIKEYAN S,NESTERENKO M.RFID security without extensive cryptography[C]// Proc of ACM Workshop on Security of Ad hoc and Sensor Networks.Alexandria,VA:ACM,2005:63-67.
  • 10EPCTM Radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860MHz~960MHz version 1.0.9[S].2005.

共引文献31

同被引文献8

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部