期刊文献+

物联网射频识别技术的安全问题及防范策略 被引量:2

Things RFID technology security issues and prevention strategies
下载PDF
导出
摘要 物联网射频识别技术作为一种新型存储信息的方法,是为了适应社会对于信息资源管理的需要,利用无限的射频方式,自动识别对象目标,进行的非接触性双向通信,从中获取相关数据信息使用网络传输到计算机的信息管理系统的高新技术。它涉及的范围比较广,例如:微波通信,物流管理,门禁系统,车辆防盗等安全防范领域。本文针对射频识别系统的重要性,预防以后面临的安全问题,促进射频识别技术的更好发展,提出一些有助于安全隐患发生的防范策略。 The Internet of things technology of radio frequency identification as a new method to store information, is in order to meet the social need for information resources management, using radio unlimited, automatic identification of objects, non con- tact of bidirectional communication, access to data and information related to the use of the network to the information management system of computer technology from in the. Its scope is wide, such as: microwave communication, logistics management, access con- trol systems, vehicle anti-theft security field. This paper addresses the importance of RFID system, security issues prevent the face, promote the development of radio frequency identification technology, and puts forward some helpful to safety risk prevention strate- gies.
作者 李毅
出处 《自动化与仪器仪表》 2014年第11期159-160,共2页 Automation & Instrumentation
关键词 物联网 射频识别技术 安全问题 防范策略 Internet of things RFID Security Prevention strategy
  • 相关文献

参考文献3

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2朗为民,雷承达,张蕾.RFID技术安全性研究[J].计算机学报.2011.
  • 3王昭顺,张晓锋.RFID安全隐患及其解决方案[C].2010国际RFID技术高峰论坛论文集.2010.

二级参考文献28

  • 1Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 2Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 3Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 4Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 5Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 6Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 7Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 8Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 9Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
  • 10Saito J,Ryou J.C,Sakurai K..Enhancing privacy of universal re-encryption scheme for RFID tags.In:Yang L.T,Guo M,Gao G.R,Jha N.K.eds..Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2004).Lectures Notes in Computer Science 3207.Berlin:Springer-Verlag,2004,879~890

共引文献210

同被引文献6

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部