期刊文献+

基于Hash链的RFID双向认证协议的设计 被引量:3

Design of RFID Authentication Protocol Based on Hash-Chain
原文传递
导出
摘要 系统中信息的安全性是制约射频识别技术(RFID)广泛应用的一个重要因素。基于Hash函数的RFID认证协议是受到广泛关注的解决方案。本文针对RFID系统存在的用户安全及隐私等问题,在讨论了现有协议的优缺点的基础上,提出了一种基于Hash链的双向认证方案。 The information security in the system is a most important factor which restricting the widely used of RFID.Hash based RFID authentication protocol is a kind of solution attracting many attentions.Against many problems such as consumers' security and privacy, this paper presents the advantage and deficiency of current solutions of RFID.A new RFID mutual authentication protocol based on Hash-chain is proposed.
作者 周晔
出处 《网络安全技术与应用》 2014年第4期100-101,104,共3页 Network Security Technology & Application
关键词 射频识别 HASH链 安全 RFID Hash-chain Security
  • 相关文献

参考文献7

  • 1游战清,李苏剑.无线射频识别技术(RFID)理论与应用[M].北京:电子工业出版社,2005.
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 3Sarma S.E., Weis S.A., Engels D.W..RFID systems an security and privacy implications.In: Kaliski B.S., Koc C.K., Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded System ( CHES 2002 ) .Lectures Notes in Computer Science 2523.Berlin : Springer-Verlag, 2003, 454-469.
  • 4Sarma S.E., Weis S.A., Engels D.W..Radio-frequency identification : Secure risks and challenges.RSA Laboratories Cryptobvtes, 2003, 6 (1): 2-9.
  • 5Weis S.A., Sarma S.E., R.ivest R.L., Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In : Hutter D. , Muller G. , Stephan W. , Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin: Springer-Verlag, 2004, 201-212.
  • 6Ohkubo M., Suzuki K., Kinoshita S.Hash-chain based forward-secure privacy protection scheme for low-cost P, FID.In : Proceedings of the 2004 Symposium on Cryptography and Information Security ( SCIS 2004 ). Sendai. 2004. 719-724.
  • 7骆宗伟,周世杰,LI Jenny.一种轻量级RFID安全协议的改进(英文)[J].电子科技大学学报,2007,36(6):1172-1178. 被引量:6

二级参考文献52

  • 1Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 2Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 3Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 4Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 5Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 6Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 7Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 8Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 9Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
  • 10Saito J,Ryou J.C,Sakurai K..Enhancing privacy of universal re-encryption scheme for RFID tags.In:Yang L.T,Guo M,Gao G.R,Jha N.K.eds..Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2004).Lectures Notes in Computer Science 3207.Berlin:Springer-Verlag,2004,879~890

共引文献245

同被引文献15

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部