期刊文献+

供应链环境下安全的RFID认证方案 被引量:2

Security RFID Authentication Scheme in Supply Chains
下载PDF
导出
摘要 供应链环境下RFID安全认证方案不仅要保证各节点的隐私安全,还应该满足供应链管理需求。针对现有方案存在不能同时兼顾两者的不足,提出一种基于"双重签名"的认证方案。标签的认证信息先后采用访问密钥和认证密钥进行双重签名生成,只有同时具备这两个密钥才能识别标签身份。该方案既可以实现标签在供应链内的安全传递,又能方便供应链的管理。分析表明,该方案较现有方案优势明显。 Security RFID authentication scheme in supply chains should not only ensure the privacy and security of all the company,but also satisfy the requirement of supply chains management.Aiming at the problem that existing schemes can't consider both sides at the same time,the paper proposed an authentication scheme based on "double signature".The tag authentication message is signed by the access key and the authentication key.Only possessing both two keys can the company identify the tag.This scheme makes tags transfer safety inside the supply chains and makes the supply chains management convenient.Analysis shows that this scheme has clear advantage compared with existing schemes.
出处 《计算机科学》 CSCD 北大核心 2014年第4期134-138,共5页 Computer Science
基金 国家863计划项目(2009AAZ438) 国家973计划项目(2011CB311801)资助
关键词 供应链管理 射频识别 双重签名 隐私保护 Supply chains management Radio frequency identification Double signature Privacy protect
  • 相关文献

参考文献14

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Gaukler G M,Seifert R W.Applications of RFID in Supply Chains[M] //Trends in Supply Chain Design and Management:Technologies and Methodologies.London:Springer Verlag,2007:29-48.
  • 3Li Ying-jiu,Ding Xu-hua.Protecting RFID Commu-nication in Supply Chains[C] //Proceeding of the 2nd ACM Symposium on Informatiom,Computer and Communications Security (ASI-ACCS' 07).Singapore,2007:234-241.
  • 4张帆,孙璇,马建峰,曹春杰,朱建明.供应链环境下通用可组合安全的RFID通信协议[J].计算机学报,2008,31(10):1754-1767. 被引量:30
  • 5邓淼磊,马建峰,周利华.RFID匿名认证协议的设计[J].通信学报,2009,30(7):20-26. 被引量:22
  • 6Lu L,Han J,Hu L,et al.Dynamic key-updating:privacy-preserviog authentication for RFID systems[C] //Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications.New York,USA,2007:13-22.
  • 7马巧梅,王尚平.一个超轻量级的RFID认证协议[J].计算机工程,2012,38(2):151-152. 被引量:11
  • 8Fouladgar S,Afifi H.An efficient delegation and transfer of ownership protocol for RFID tags[C] //1st International EURASIP Workshop on RFID Technology.Vienna,Austria,2007.
  • 9陈志德,陈友勤,许力.RFID标签所有权转换安全协议[刀.通信学报,2010,31(9A):202-208.
  • 10Song B,Mitchell C J.Scalable RFID security protocols supporting tag ownership transfer[J].Computer Communications,2011(34):556-566.

二级参考文献75

  • 1鞠伟成,俞承芳.一种基于动态二进制的RFID抗冲突算法[J].复旦学报(自然科学版),2005,44(1):46-50. 被引量:42
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID Tags[C] //Proc. of the 2nd Workshop on RFID Security. [S. l.] : IEEE Press, 2006.
  • 4Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. EMAP: An Efficient Mutual Authentication Protocol for Low-cost RFID Tags[C] //Proc. of IS’06. [S. l.] : Springer-Verlag, 2006: 352-361.
  • 5Chien Hung-Yu. SASI: A New Ultralightweight RFID Authen- tication Protocol Providing Strong Authentication and Strong Integrity[J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4): 337-340.
  • 6Lee Y C, Hsieh Y C, You P S, et al. A New Ultralightweight RFID Protocol with Mutual Authentication[C] //Proc. of WASE’09. [S. l.] : IEEE Press, 2009: 58-61.
  • 7Peris-Lopez P, Hernandez-Castro J C, Tapiador M E, et al. Secu- rity Flaws in a Recent Ultralightweight RFID Protocol[C] // Proc. of International Conference on RFID. Orlando, USA: IEEE Press, 2010.
  • 8Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 9Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 10Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212

共引文献249

同被引文献26

  • 1Juels A.RFID security and privacy:a research survey[J].IEEE Journal on Selected Areas in Communications,2006,24(2):381-394.
  • 2Liao Yipin,Hsiao C M.A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol[J].Ad hoc Networks,2014,18(7):133-146.
  • 3Li Yingjiu,Ding Xuhua.Protecting RFID communications in supply chains[C] //Proc of the 2nd ACM Symposium on Information,Computer and Communications Security.New York:ACM Press,2007:234-241.
  • 4Xin Wei,Guan Zhi,Yang Tao,et al.An efficient privacy-preserving RFID ownership transfer protocol[M] //Proc of the 15th Asia-Pacific Web Conference on Web Technologies and Applications.Berlin:Springer,2013:538-549.
  • 5Gaoa S,Wanga H.Design and analysis of pseudorandom number generator compatible with EPC C1G2 tag[J].Journal of Information and Computational Science,2012,9(10):2865-2876.
  • 6Kapoor G,Piramuthu S.Single RFID tag ownership transfer protocols[J].IEEE Trans on Systems,Man,and Cybernetics,Part C:Applications and Reviews,2012,42(2):164-173.
  • 7Zuo Yanjun.Changing hands together:a secure group ownership transfer protocol for RFID tags[C] //Proc of the 43rd Hawaii International Conference on System Sciences.[S.l.] :IEEE Press,2010:1-10.
  • 8Yang Minghou.Secure multiple group ownership transfer protocol for mobile RFID[J].Electronic Commerce Research and Applications,2012,11(4):361-373.
  • 9Kulseng L,Yu Zhen,Wei Yawen,et al.Lightweight mutual authentication and ownership transfer for RFID systems[C] //Proc of INFOCOM.[S.l.] :IEEE Press,2010:1-5.
  • 10Munilla J,Peinado A,Yang Guoming,et al.Enhanced ownership transfer protocol for RFID in an extended communication model[J/OL].(2013-04-02).http:eprint.iacr.org/2013/187.pdf.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部