期刊文献+

基于Hash函数的RFID协议改进方案 被引量:1

Improvement Plan of RFID Protocols Based on Hash Function
下载PDF
导出
摘要 近年来,随着RFID的广泛应用,它的安全问题引起了人们的重视.目前常用的RFID安全协议都存在着各种各样的缺陷.本文在分析了常用RFID安全协议的缺陷的基础上,提出了一种新的改进方案.新方案中通过在后端数据库和标签之间增加计数值的办法减少后端数据库进行Hash运算的次数,旨在从整体上提高系统的效率. In recent years, with a wide range of RFID applications, the security issues of RFID raise the attention of people. At the present, the staple security protocols about RFID have all kinds of defect. In this paper, I propose a new improvement protocol based on analysis of several commonly used RFID security protocols. The new plan aims to improve overall system efficiency by setting count values between back-end database and tags to reduce the numbers of database on making Hash operation. And the new improvement plan improves the efficiency of the system.
出处 《德州学院学报》 2013年第2期54-56,65,共4页 Journal of Dezhou University
关键词 RFID 安全协议 改进方案 RFID security protocols improvement plan
  • 相关文献

参考文献4

二级参考文献14

  • 1杨海东,杨春.RFID安全问题研究[J].微计算机信息,2008,24(8):238-240. 被引量:34
  • 2章轶,刘皖,陈琳.基于Hash函数的RFID认证协议改进设计[J].微计算机信息,2008,24(11):214-216. 被引量:4
  • 3王天吉.无线射频识别技术(RFID)应用的关键问题[J].现代电子技术,2007,30(8):170-172. 被引量:15
  • 4王金川,覃真,韩煜.射频技术发展现状与应用[J].电子技术应用,2007,33(7):5-7. 被引量:6
  • 5Burrows M A,Needham R.A Logic of Authentication [J].ACM Transactions on Computer Systems,1990,8(1):18-36.
  • 6Ohkubo M,Suzuki K, Kinoshita S. Cryptographic Approach to Privacy-Friendly" Tags [C]//Proc. of RFID Privacy Workshop,USA MIT, 2003.
  • 7Sarma S.E.,Weis S.A.,Engels D.W..Radio frequency identification:Secure risks and challenges [J].RSA Laboratories Cryptobytes, 2003,6(1):2-9.
  • 8欧阳长青.低成本RFID安全协议研究[D].湖南大学,2008.
  • 9KlausFinkenzener.射频识别技术锑3版.吴晓峰等译.北京:电子工业出版社,2006.
  • 10Luo Zongwei, Chan Terry, Li Jenny S.A lightweight mutual authentication protocol for RFID networks. Proceedings of the 2005 IEEE International.Conference One-Business Engineering,2005.

共引文献14

同被引文献26

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2雷吉成.物联网安全技术[M].北京:电子工业出版社,2012:34-35.
  • 3Tan C C, Sheng B, and Li Q. Secure and severless RFID authen- tication and search protocols[ C ] //Proc of the 5th Annual IEEE International Conference on Pervasive Computing and Communi- cations, New York :IEEE ,2007:24 -29.
  • 4Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, etal. Se- cure tag search in RFID systems using mobile readers [ J ]. IEEE Transactions on Dependable and Secure Computing ,2014, (99) :.
  • 5Juels A,Pappu R. Squealing Euros:Privacy Protection in RFID- Enabled Banknotes [ C ]. Financial Cryptography. Springer Ber- lin Heidelberg,2003 : 103 -121.
  • 6Go|le P, Jakobsson M, Juels A. Syverson universal re-eneryption for mixnets [ C ]//The Cryptographers' Track at the RSA Confe- rence 2004, San Francisco, CA, USA ,2004 : 163 -178.
  • 7Samad Rostampour, Mojtaba Eslamnezhad Namin, Mehdi Hos- seinzadeh. A novel mutual RFID authentication protocol with low complexity and high security[J]. International Journal of Modem Education and Computer Science ( IJMECS ) , 2014,6 ( 1 ) : 17 - 24.
  • 8Hua Man, Li Yanling. Security authentication protocol analysis and security issue of RFID [ C ]Jj2011 2nd International Confe- rence on Management Science and Engineering, MSE 2011, En- gineering Technology ,2011.
  • 9Blom R. An optimal class of symmetric key generation system- s[ C]//Proc of the Eurocrypt84 Workshop on Advances in Cryp- tology: Theory and Application of Crypto-graphic Techniques, Paris, France, 1984:335 -338.
  • 10Dai H Y, Xu H B. Key predistribution approach in wireless sensor networks using LU matrix [ J]. IEEE Sensors Journal, 2010, 10(8) :1399 -1409.

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部