期刊文献+

基于双因子认证技术的RFID认证协议的设计 被引量:11

Double factors based authentication protocol for RFID
下载PDF
导出
摘要 针对结合了网络应用的RFID应用系统面临的新的网络安全问题,设计了"基于硬件设备信息+密码技术"的双因子身份认证协议以解决后端服务器对RFID读写器身份合法性的认证问题。协议中所用硬件设备信息为RFID读写器射频模块OEM配置数据中的唯一串号,该串号可以在读写器控制程序中调用API函数实时获取。密码技术则采用轻量级加密算法AES。该认证协议适用于产品防伪、仓储管理、物流跟踪等新兴领域,具有一定的现实意义与实用价值。 Aiming at the new security problems of radio frequency identification system (RFID) which is combined with network, a new so-called two-factor authentication protocol is presented. It is designed to help the back-end server ensuring the legitimacy of the reader in RFID system. This authentication protocol is based on the hardware device information and cryptographic technique. The hardware device information is gained from the only serial number of the OEM RF module configuration data of the reader. The only serial number can be read and written by calling the API function in the real-time access. The cryptographic technique uses a lightweight encryption algorithm which is called Advanced Encryption Standard (AES). This Twofactor authentication protocol is applicable to product security, warehouse management, logistics tracking and other emerging areas, which has certain practical significance and practical value.
出处 《计算机工程与设计》 CSCD 北大核心 2013年第11期3726-3730,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(61063045 61262003) 广西自然科学基金项目(2010GXNSFC013013)
关键词 信息安全 射频识别 身份认证 硬件信息 高级加密标准 information security RFID identity authentication hardware information AES
  • 相关文献

参考文献12

  • 1Juels A. RFID security and privacy: A research survey [J]. IEEE Journal on Selected Areas in Communications, 2006, 24 (2): 381-394.
  • 2He L, Gan Y, Sun T, et al. A revised efficient authentication protocol for low-cost RFID system [C]//Third International Symposium on Intelligent Information Technology Application Workshops, 2009.
  • 3Tuan A P, Hasan M S, Hongnian Y. A RFID mutual authen- tication protocol based on AES algorithm [C]//UKACC International Conference on Control, 2012.
  • 4Shi-Cho C, Kuan J H, Hsiang M C. An efficient and flexible way to protect privacy in RFID environment with licenses [C]//IEEE International Conference on RFID, 2008.
  • 5曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 6Ramachandra V. Rahman M, Sampalli S. Lightweight matrix-based authentication protocol for RFID [C]//19th Internatio- nal Conference on Software, Telecommunications and Computer Networks, 2011.
  • 7Bailey L A. Lightweight RFID authentication protocols [D]. Michigan State University, 2008.
  • 8李志全.基于Hash函数的RFID安全认证协议的研究与设计[D].太原:太原科技大学,2011.
  • 9丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592. 被引量:93
  • 10Mei S, Yang X. An efficient authentication protocol for low-cost RFID system in the prensence of malicious readers [C]//9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012.

二级参考文献46

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2吴永祥.射频识别(RFID)技术研究现状及发展展望[J].微计算机信息,2006(11Z):234-236. 被引量:119
  • 3Allen Denver. MS Serial Comm inWin32 [M]. Mi2crosoft Rearch (MSDN).
  • 4基于中间件和RFID技术的物流管理系统的应用研究,杨志和,广西大学,2007.6.
  • 5Roberts C M. Radio Frequency Identification (RFID) [J]. Computers& Security, 2006, 25(1): 18-26.
  • 6International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 7Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 8Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 9Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 10Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001

共引文献126

同被引文献116

引证文献11

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部