期刊文献+

RFID射频识别系统的隐私和安全研究 被引量:3

下载PDF
导出
摘要 RFID射频识别是一项非接触式的自动识别技术,在无线传感网络中处于核心地位,它通过射频信号自动识别目标对象并获取相关数据,可快速自动识别高速运动物体并同时识别多个标签,识别工作无须人工干预.但RFID在获得广泛应用的同时,也面临着信息安全和隐私保护方面的问题和考验.本文主要针对射频识别系统的风险、安全需求、可能遭受的攻击类型、安全机制和策略等几个方面展开讨论和研究,旨在从技术层面分析和解决射频识别系统的隐私和安全问题,减少因隐私和安全问题给射频识别系统带来的影响.
作者 张剑锋
出处 《赤峰学院学报(自然科学版)》 2015年第1期62-64,共3页 Journal of Chifeng University(Natural Science Edition)
  • 相关文献

参考文献4

二级参考文献35

  • 1黄爱蓉.高性能DDS信号产生器的设计研究[J].微计算机信息,2005,21(08S):153-156. 被引量:17
  • 2郎为民,雷承达,张蕾.RFID技术安全性研究[J].微计算机信息,2006(06Z):269-271. 被引量:28
  • 3Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 4Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 5Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 6Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 7Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 8Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 9Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 10Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627

共引文献213

同被引文献17

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部