期刊文献+

基于RFID的物联网安全性研究 被引量:2

Internet of Things Security Research Based on RFID
下载PDF
导出
摘要 通过物联网的研究历史和现状进行了总结和分析,阐述和分析物联网以及RFID的组成和工作原理,并根据这些内容对现有技术中存在的一些安全隐私问题进行重点研究。针对关于RFID的攻击手段,分别介绍基于物理机制的解决方案以及基于密码技术的解决方案。为了满足RFID系统对安全隐私方面的需求,并改善原有安全协议中的缺陷,提出一个基于时间戳的挑战——应答模式的双向认证协议。 Security threats restricted the development of the Internet of Things. This paper summarizes the historical and present situation of the Internet of Things, analyses the structure and working principle of RFID, and lays emphasis on the research of the privacy problems caused by existing technologies. Two kinds of methods, based on the physical mechanism and password technology, used to solve the attacks of RFID are introduced. An two-way authentication protocol based on timestamp is proposed which can meet the security requirements of RFID, and improve the defects of present security protocols.
作者 林桐 刘文杰
出处 《信息通信技术》 2014年第5期43-47,共5页 Information and communications Technologies
关键词 物联网 射频识别技术 安全性 Internet of Things RFID Security
  • 相关文献

参考文献6

二级参考文献59

  • 1周东清,李燕,苏庆福.层次型结构无线传感器网络安全协议设计[J].计算机工程与设计,2007,28(10):2329-2331. 被引量:8
  • 2宁焕生,张彦.RFID与物联网[M].北京:电子工业出版社,2008.
  • 3宁焕生.RFID重大工程与国家物联网[M].北京:机械工业出版社,2010:169-173.
  • 4Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 5Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 6Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 7Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 8Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 9Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 10Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84

共引文献226

同被引文献22

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部