期刊文献+

低碳供应链环境下物联网RFID可信度研究 被引量:1

Study on the Credibility of Internet of Things RFID Under Low-Carbon Supply Chains Enviroment
下载PDF
导出
摘要 针对低碳供应链环境下物联网可信度的相关要求,提出一种基于供应链的RFID改进随机Hash锁协议.结合随机预言模型安全理论(ROM),运用数据进行实验.结果表明,该协议实现了访问认证、匿名安全、防重传性、防追踪性、数据问责、缩时增效和成本优势,可有效提升低碳供应链环境下物联网可信度. Based on a detailed analysis of the requirements of the internet of things reliability under low-carbon supply chains environment,this paper proposes an improved random Hash lock protocol of RFID to suit supply chains.Proved by the experiment based on the ROM security theory,the protocol can solve the security problems of access certification,anonymous security,anti retransmission,anti-tracking,data accountability,efficiency and cost,and improve the credibility of internet of things under low-carbon supply chains environment effectively.
作者 杨传明
出处 《微电子学与计算机》 CSCD 北大核心 2015年第9期144-147,152,共5页 Microelectronics & Computer
基金 国家自然科学基金资助项目(71071141) 教育部人文社科基金资助项目(13YJC630199) 江苏省高校哲学社科基金资助项目(2012SJB630059) 江苏省高校研究生科研创新计划资助项目(CXZZ13_0847)
关键词 可信度 物联网 低碳供应链 RFID credibility RFID internet of things low-carbon supply chains
  • 相关文献

参考文献8

  • 1刘培学,高颖,陈玉杰.分组自适应多叉树RFID防碰撞算法研究[J].微电子学与计算机,2014,31(10):156-159. 被引量:1
  • 2Masoumeh Saikhani. Cryptanalysis of the protocol: A hash-based RF1D tag mutual authentication protocol [J]. Journal of Computational and Applied Mathemat- ics, 2014,259 (15) :571-577.
  • 3Jin Sha Yuan, Yue Hu. Implementation of RFIDmid- dleware based on hash chain[J]. Applied Mechanics and Materials, 2013,41(12) : 12-15.
  • 4Masoud Hadian Dehkordi. Improvement of the hash- based RFID mutual authentication protocol[J]. Wire- less Personal Communications, 2013,25(8) .- 152-159.
  • 5M Sandhya, T R Rangaswamy. Zero knowledge and hash-based secure access control scheme for mobile RFID systems[J]. Arabian Journal for Science and En- gineering, 2013,16(9) : 77-84.
  • 6M Moessner, Gul N Khan, T R Rangaswamy. Secure authentication scheme for passive C1G2 RF1D tags [J]. Computer Networks, 2012,56(1) : 273-286.
  • 7周永,杨云志,李元忠,朱宏.利用RFID和VFID技术实现卡车和集装箱自动识别管理系统[J].电讯技术,2014,54(4):379-384. 被引量:8
  • 8Kimmo Halunen. Multicollisions and graph-based hash functions[J]. Trusted Systems, 2012, 9(3):156-167.

二级参考文献9

共引文献7

同被引文献9

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部