期刊文献+

基于脆弱零水印的RFID标签篡改检测

Tamper detection of RFID tags based on fragile zero watermark
下载PDF
导出
摘要 针对RFID标签在供应链中潜在的数据完整性问题,结合低成本标签在现有标准框架中应遵循的条件,分析现有标签篡改检测方法的不足,提出基于脆弱零水印的RFID标签篡改检测方法。将水印存放在后台数据库中,这种将水印和标签载体进行物理隔离的方法节省了标签的存储空间,且和现有标准相兼容。理论分析结果表明,与现有方法相比,该方案所采用的低复杂度算法易于实现,在没有增加各项指标都有限的低成本标签负担的基础上提高了RFID标签的安全性。 Aiming at the potential data integrity problems of RFID tags in the supply chains and combining the application conditions of the low cost tags in existing standard framework,the shortages of existing tamper detection method were analyzed,the tamper detection scheme of RFID tags based on fragile zero watermark was proposed.The watermark was put into the backend database in this scheme,which made the tag and watermark physically isolated in which way the memory of the tag was saved and existing standards were compatible with.Theoretical analysis demonstrates that the scheme with low complexity algorithms is easy to implement compared with the existing schemes,at the same time it improves the security of the RFID tags without adding extra cost in limited low cost tags.
出处 《计算机工程与设计》 北大核心 2015年第4期862-865,878,共5页 Computer Engineering and Design
关键词 脆弱零水印 RFID标签 篡改检测 安全性 数据完整性 fragile zero watermark RFID tag tamper detection security data integrity
  • 相关文献

参考文献13

  • 1Cho Jung-Sik, Yeo Sang-Soo, Sung Kwon Kim. Securing against brute-force attack: A bash-based RFID mutual authentica- tion protocol using a secret value [J]. Computer Communications, 2010, 34 (3): 391-397.
  • 2Dang Nguyen Duc, Kwangio Kim. Defending RFID authentica- tion protocols against DoS attacks [J]. Computer Communica- tions, 2011, 34 (3): 384-390.
  • 3张帆,孙璇,马建峰,曹春杰,朱建明.供应链环境下通用可组合安全的RFID通信协议[J].计算机学报,2008,31(10):1754-1767. 被引量:30
  • 4EPClobal Inc, EPC radio-frequency identity protocols class-1 generation 2 UHF RF1D protocol for communications at 860 MHz- 960 MHz version 1.4 [S]. USA: GS1 EPCglobal, 2008.
  • 5Bernardi P. An anti-counterfeit mechanism for the application layer in low cost RFID devices [C] //Proe 4th European Conference on Circuits and Systems {or Communications, 2008: 227-231.
  • 6Spiekermann S. Critical RFID privacy enhancing technologies [J]. IEEE Security and Privacy, 2009, 7 (2); 56 62.
  • 7Yamamoto A. A tamper detection method for RFID tag data [C] //IEEE International Conference on RF1D, 2008:51 57.
  • 8Han S, Chu C, Luo Z. Tamper detection in the EPC network using digital watermarking [J]. 1EEl; Security - Privacy, 2011, 9 (5): 62-69.
  • 9Fan M, Wang H. Tamper discrimination in RFID tags usingchaotic {ragile watermark [C] //International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009: 147-150.
  • 10Ali Nur Mohammad Noman, Kevin Curran, Tom Lunney. A watermarking based tamper detection solution for RFID tags [C] //Sixth International Conference on Intelligent Informa- tion Hiding and Multimedia Signal Processing, 2010:98 101.

二级参考文献44

  • 1Lahouari G, Ahmed B, Mohammad K I, et al. Digital image watermarking using balanced multiwavelets[J]. IEEE Trans on Signal Processing, 2006, 54(4) : 1519-1536.
  • 2Tsai M J, Hung H Y. DCT and DWT-based image watermarking by using subsampling [ C ] //ICDCSW' 04. Hachioji: [ s. n. ] , 2004: 184-189.
  • 3Sharkas M, E1Shafie D, Hamdy N. A dual digital-image watermarking technique [C]//WEC '05. Istanbul: [ s. n. ] , 2005 : 136-139.
  • 4Sarma S, Weis S, Engels D. White paper: RFID systems, security and privacy implications. Auto-ID Center, MIT:Technical Report MIT-AUTOID-WH-014, 2002
  • 5Juels A, Weis S A. Defining strong privacy for rfid//Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'07). Washington, DC, USA, 2007:342-347
  • 6Burmester M, Le T, Medeiros B. Provably secure ubiquitous systems: Universally composable RFID authentication protocols//Proceedings of the Conference on Security and Privacy in Communication Networks (SECURECOMM). Baltimore, Maryland, USA, 2006:1-9
  • 7Li Y, Ding X. Protecting rfid communications in supply chains//Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security ( ASIACCS' 07). Singapore, 2007:234-241
  • 8Sarma S, Weis S, Engels D. Radio-frequency identification systems//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems. San Francisco, USA, 2002:454 -469
  • 9Juels A. RFID security and privacy: A research survey. Journal of Selected Areas in Communication (J-SAC), 2006, 24(2) : 381-395
  • 10Juels A, Rivest R L, Szydlo M. The blocker tag: Selective blocking of RFID tags for consumer privacy//Proceedings of the 8th ACM Conference on Computer and Communications Security(CCS). Washington DC, USA, 2003:103-111

共引文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部