期刊文献+

最优分组索引的RFID安全协议 被引量:1

最优分组索引的RFID安全协议
下载PDF
导出
摘要 由于RFID系统及设备的特殊性和局限性,以及使用开放的无线通信链路,从而带来许多安全问题,目前还缺乏安全、高效、实用的低成本RFID安全协议。本文对现有几种典型的安全协议进行了分析,并指出其存在的安全缺陷和漏洞。针对基于分组索引的RFID安全协议所存在的问题,本文提出了最优分组方案,使其索引的时间复杂度降为最低,同时采用随机数、Hash函数、标签与后端数据库共享密钥机制等,解决了RFID中的隐私保护、跟踪、欺骗攻击、前向安全、后向安全、妥协攻击等安全性问题。 Some safety problems exist in RFID system because of the special characteristics and limitations of its devices, and the open environment with wireless far there are few safe, efficient, practical and low cost RFID safety protocols.In this paper, we analysis several traditional RFID protocols, then point out the existing safety defect and loophole.Aim at the safety problems for the protocol based on the grouping, the optimum method for grouping is presented.It makes the time complexity reduced to the minimum value. In the mean time, this security protocol can protect privacy, prevent tracking and spoofing attacks, ensure forward security and backward security, by using random number generator, Hash function and the key mechanism shared by the tag and the back-end database.
出处 《电子世界》 2013年第10期81-83,共3页 Electronics World
基金 广东省江门市科技计划项目(江财工[2011]131号)
关键词 RFID 分组索引 安全协议 时间复杂度 RFID grouping index security protocol time complexity
  • 相关文献

参考文献8

  • 1Ati Juels.RFID Security and Privacy:A Research Survey[J]. IEEEJOURNAL ON SELECTED AREAS IN COMMUNI CATIONS,2006,4(2):381-394.
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3李莉,刘建伟.RFID安全保密技术研究进展[J].信息安全与通信保密,2007,29(8):165-167. 被引量:9
  • 4Sanjay E.Sarma,Stephen A.Weis and Daniel W.Enggels.Radio- Frequency Identification: Security Risks and ChaUenges[J].RSA Laboratories Cryptobytes,2003,6(1):1-32.
  • 5Sanjay E.Sarma,Stephen A.Weis and Danid W.Engels.RFID systmns and security and privacy implications[M].Ctyptographic Hardware and Embedded Systems-CFIES 2002.Springer Berlin Heiddberg,2003:454-469.
  • 6Stephen A.Weis,Sanjay E.Samaa,Ronald L.Rivest and Daniel W.Engels.Security and ptivacsy aspects of lowest radio frequency identification systems[J].Security in Pervasive Computing. Lecture Notes in Computer Sdence,2004,2802:201-212.
  • 7Rhee K,Kwak J.Kim S,etal.Challenge-response based RFIDauthenticadon protocolfor distributed databaseenviro- nment[M] .Se c urityinPervasiveComputing.S'pringerB erlin Heidelberg,005:70- 84.
  • 8MOLNAR D,WAGNER D.Ptivacy and secrityinlibrary RFID:issues,pracfices,and cloning attacks[J].SECURECOMM, 2005,5(20):13-22.

二级参考文献33

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2郎为民,雷承达,张蕾.RFID技术安全性研究[J].微计算机信息,2006(06Z):269-271. 被引量:28
  • 3[2]Garfinkel S L,Juels A,Pappu R.RFID Privacy:An Overview of Problems and Proposed Solutions[J].Security & Privacy Magazine,IEEE,2005,3(3):34~43.
  • 4[3]Ari Juels,Ronald L,Rivest,Michael Szydlo.The Blocker Tag:Selective Blocking of RFID Tags for Consumer Privacy[M].ACM Press,2003:103~111.
  • 5[4]Gunter Karjoth,Paul A.Moskowitz.Disabling RFID Tags with Visible Confirmtion:Clipped Tags Are Silenced[M].ACM Press,2005,27~30.
  • 6Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 7Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 8Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 9Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 10Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153

共引文献216

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部