期刊文献+

一种读写器参与计算的RFID认证协议

The RFID authentication protocol through a reader taking part in calculation
下载PDF
导出
摘要 伴随着物联网技术的兴起,射频识别(RFID)技术受到更为广泛的关注,其安全特性与面临的隐私问题制约了其应用。针对这些问题,学者提出诸多安全协议以应对,然而现有协议大都将RFID读写器作为传递数据的工具,而没有充分开发读写器在协议中的运算作用。本文设计了一个读写器参与识别计算的协议,标签和后端数据库存储不同的秘密,并通过读写器建立联系,这样不仅可以抵抗常见的攻击,而且可以抵抗因后端数据库所存储的识别表意外失窃所带来的对整个系统的危险。 Along with the rise of the Internet of Things technology, radio frequency identification (RFID) technology is taken more attentions, while its security and privacy features limit its usage. Facing with those problems, many protocols had been proposed, while in those protocols, the RFID reader was only a kind of message transmitter and it effect was not developed. In this text, a new scheme is suggested. In the scheme, the tag and the back-end database keep the different secret, and the reader builds their relation. By this means, the scheme can not only resist the common attacks, but also resist the system threaten which due to the verification tables is lost by accident.
出处 《电子设计工程》 2015年第9期88-92,共5页 Electronic Design Engineering
关键词 RFID 识别协议 安全 隐私 RFID authentication protocol security privacy
  • 相关文献

参考文献12

  • 1Protest against RFID[EB/OL]. (2010-03-29)http://www.spy- chips.com.
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3Weis S,Sarma S,Rivest R,et al. Security and privacy aspects of low-cost radio frequency identification systems[C]// In: Proceedings of the 1st International Conference on Security in Pervasive Computing, Boppard, Germany: Springer LNCS, 2003 (2802) :201-212.
  • 4Sarma S E,Weis S A,Engels D W. RFID systems and security and privacy implication [C]. In: Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, CA, USA: Springer LNCS,2002 (2523): 454-469.
  • 5M. Ohkubo, K. Suzuki, and S. Kinoshita. Hash-chain Based Forward-secure Privacy Protection Scheme for Low-cost RFID [C]//In: Proceedings of the 2004 Symposium on Cryp- tography and Information Security, Sendai, Japan, 2004: 719-724.
  • 6Rhee K,Kwak J,Kim S,et al. Won. Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment [C]//In: Proceedings of the 2nd International Conference On Security In Pervasive Computing. Boppard, Germany: Springer LNCS,2005(3450):70-84.
  • 7Henriei D,Muller P. Hash-based Enhancement of Location Privaey for Radio-Frequency Identification Devices Using Varying Identifiers [C]//In: Proceedings of the 2nd IEEE Annual Conference On Pervasive Computing and Communications Workshops, Washington DC, USA: IEEE Computer Society, 2004:149-153.
  • 8Ha J C,Moon S J,Nieto J M G,et al. Boyd. Low-Cost and Strong-Security RFID Authentication Protocol [C]. In: Proceedings of the EUC Workshops 2007, Taipei: Springer LNCS, 2007 (4809) :795-807.
  • 9Song B, Mitchell C. RFID Authentication Protocol for Low- cost Tags [C]//In: Proceedings of the First ACM Conference on Wireless Security. Virginia, USA: ACM Press,2008:140- 147.
  • 10Song B. Server Impersonation Attacks on RFID Protocols[C]// In: Proceedings of the Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, IEEE Computer Society, Valencia, Spain, 2008:50-55.

二级参考文献28

  • 1Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 2Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 3Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 4Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 5Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 6Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 7Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 8Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 9Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
  • 10Saito J,Ryou J.C,Sakurai K..Enhancing privacy of universal re-encryption scheme for RFID tags.In:Yang L.T,Guo M,Gao G.R,Jha N.K.eds..Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2004).Lectures Notes in Computer Science 3207.Berlin:Springer-Verlag,2004,879~890

共引文献210

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部