期刊文献+

一种基于双随机数的RFID发现服务安全通信机制 被引量:1

A Double Random Number Based Secure Communication Mechanism of RFID Discovery Service
下载PDF
导出
摘要 RFID发现服务没有得到广泛应用,相关标准也没有正式颁布,主要原因之一就是存在诸多安全问题.本文首先分析了存在的典型安全问题,并给出了相应的安全需求,例如RFID私密性保护、RFID编码授权访问、供应链节点不可追踪性、节点认证、消息正确性等.针对这些安全需求,本文提出了一种基于双随机数的RFID发现服务安全通信机制.双随机数主要用来对参与通信的双方进行节点认证和消息认证,并给出了相应的查询生成和处理转发流程及算法.本文提出的安全通信机制已经在PKU RFID3S系统中得到实现.实验结果表明,系统在实现安全需求的基础上,有较好的查询命中率和查询响应时间. RFID discovery service is not widely used and related standard is not published,one main reason is the existence of some security issues.Typical security issues are analyzed,and related security requirements are given,i.e.RFID privacy protection,authorized RFID code access,untraceability of supply chain node,node authentication,message correctness,etc.According to these security requirements,a double random number based secure communication mechanism of RFID discovery service is proposed.Random number is used for node authentication and message authentication,and related query generating and routing algorithm are given.This mechanism is implemented in PKU RFID3S system.The simulation tests show that the system not only implements security requirements mentioned above,but also has acceptable query hit rate and query responding time.
出处 《电子学报》 EI CAS CSCD 北大核心 2013年第1期153-160,共8页 Acta Electronica Sinica
基金 国家973重点基础研究发展计划(No.2009CB320706) 国家自然科学基金(No.60803014) "核高基"国家科技重大专项(No.2010ZX01045-001-008)
关键词 RFID 发现服务 安全通信机制 双随机数 RFID discovery service secure communication mechanism double random number
  • 相关文献

参考文献8

  • 1VeriSign. The EPC network:Enhancing the supply chain[R].VeriSign Inc,Mountain View,CA,2004.
  • 2R Agrawal,A Cheung,K Kailing,S Schonauer. Towards traceability across sovereign,distributed RFID databases[A].Delhi,India,2006.174-184.
  • 3EPCglobal. EPC information services(EPCIS) version 1.0.1specification[OL].http://www.epcglobalinc.org/standards/epcis/epcis_ 1 _0_ 1-standard-20070921.pdf,2007.
  • 4赵文,李信鹏,刘殿兴,张世琨,王立福.供应链环境下一种分布式RFID发现服务[J].电子学报,2010,38(B02):99-106. 被引量:10
  • 5Jakkhupan Worapot;Yuefeng Li;Arch-Int Somjit.Design and implement of the EPC discovery services with confidentiality for multiple data owners[A]广东广州,201019-25.
  • 6Qiang Yan;Robert H Deng;Zheng Yan;Yingjiu Li;Tieyan Li.Pseudonym-based RFID discovery service to mitigate unauthorized tracking in supply chain management[A]新加坡,201021-26.
  • 7Trevor Burbridge,Mark Harrison. Security considerations in the design and peering of RFID discovery services[A].Orlando(USA),2009.249-256.
  • 8Liu Xueyang,Zhao Wen,Huang Kaimu,Feng Zhiming Zhang Shikun Wang Lifu. A secure communication mechanism of P2P RFID code resolution network[J].Chinese Journal of Electronics,2010,(04):621-626.

二级参考文献10

  • 1EPCglobal. The EPCglobal architecture framework [ S/OL]. http://www, epcglobalinc, org/standards/architecture/architecture_ 1 _ 2- framework-20070910, pdf, 2007-09.
  • 2EPCglobal. EPCglobal Tag Data Standards Version 1.4 [ S/ OL]. http://www, epcglobalinc, org/standards/tds/tds_ 1 _ 4- standard-20080611, pdf, 2008-06.
  • 3EPCglobal. The application level events (ALE) specification version 1. 1 [ S/OL ]. http://www, epcglobalinc, org/standards/ale/ale_ 1_ 1-standard-core-20080227. pdf,2008-02.
  • 4K Vitasek. Logistics Terms and Glossary[ S ]. Supply Chain Visions, Bellevue, WA, Oct 2003.
  • 5H H Bi,D K J Lin. RFID-enabled discovery of supply networks [ J]. IEEE Transactions on Engineering Management, 2009, 56 (1) :129 - 141.
  • 6VeriSign. The EPC Network:Enhancing the Supply Chain[R]. VeriSign Inc,Mountain View, CA,2004.
  • 7R Agrawal,A Cheung,K Kailing, S Schonauer. Towards traceability across sovereign, distributed RFID databases[ A ]. Desai B C. Proc. of the 10th Int. Database Engineering & ApplicationsSymposium[ C]. Delhi, India, 2006.174 - 184.
  • 8F Lai, J Hutchinson, G Zhang. Radio frequency identification (RFID) in China:Opportunities and challenges[J].Int. J.Retail Distrib Manag,2005,33(11/12) :905 - 916.
  • 9ISO. Traceability in the feed and food chain General principles and guidance for system design and development [ S ]. ISO 22005,2007.
  • 10EPCglobal. EPC information services(EPCIS) version 1.0.1 specification [ S/OL ]. http://www, epcglobalinc, org/standards/epcis/epcis_ 1_ 0_ 1-standard-20070921. pdf,2007-09.

共引文献9

同被引文献14

  • 1吴爱华.多固定阅读器下基于路径约束的RFID数据清洗算法[J].计算机研究与发展,2011,48(S3):282-289. 被引量:5
  • 2Sun H M, Ting W C, Wang K H. On the security of Chien' s ultra- lightweight RFID authentication protocol efficient time-bound hierar-chical key management . IEEE Transactions on Dependable and Se- cure Computing, 2011; 29(8): 315-317.
  • 3Hong J, Suh E, Kim S J. Context-aware systems: a literature review and classification. Expert Systems with Applications, 2009 ; 36 (4) : 8509-8522.
  • 4Gao L, Lu Z. Low-cost RFID security protocols survey. Cross Strait Quad-Regional Radio Science and Wireless Technology Conference ( CSQRWC), IEEE, 2011 ; 2 : 1068-1070.
  • 5Alomair B, Clark A, Cuellar J, et al. Scalable RFID systems : a pri- vacy-preserving protocol with constant-time identification. Parallel and Distributed Systems, IEEE Transactions on, 2012; 23 (8) : 1536-1550.
  • 6Tian Y, Chen G, Li J. A new ultralightweight RFID authentication protocol with permutation. Communications Letters IEEE, 2012 ; 16 ( 5 ) : 702-705.
  • 7Li T, Luo W, Mo Z, et al. Privacy-preserving RFID authentication based on cryptographical encoding. INFOCOM, 2012 Proceedings IEEE. IEEE, 2012:2174-2182.
  • 8Song B, Mitchell C J. Scalable RFID security protocols supporting tag ownership transfer. Computer Communications, 2011 ; 34 ( 4 ) : 556-566.
  • 9丁治国,郭立,王昱洁.基于密钥阵列的RFID安全认证协议[J].电子与信息学报,2009,31(3):722-726. 被引量:15
  • 10丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592. 被引量:93

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部