期刊文献+

基于秘密身份的高安全性RFID网络协议 被引量:1

Secret identity based high security RFID network protocol
下载PDF
导出
摘要 针对现有的RFID安全协议计算成本较高及无法抵御完全的主流RFID攻击,提出一种基于秘密身份与单向hash函数的轻量级安全协议。第一阶段,标签向数据库注册,数据库为标签分配一个一次性的秘密身份与一个唯一的秘钥;第二阶段,基于一次性秘密身份与单向hash函数进行标签-阅读器-数据库之间的双向认证,实现了对各种攻击的检测与抵御能力。最终,将本协议与近期性能较好的双向认证协议进行比较。结果表明,本协议与其他协议的计算成本、内存需求接近,且具有完全的攻击抵御能力。 The computational cost of the existing RFID security protocols is high or the existing protocols can't defense the all kinds of the popular RF]D attacks, a secret identity and one-way hash function based highlight security protocol. In the first phase, tag registers to dataset, dataset assigns a one-time secret identity and one unique secret key to the tag; in the second phase, the mutual authentication of tag-reader-dataset is processed by one-time secret identity and one-way hash function, and the detection and defense power of all kinds of attacks is realized. At last, the proposed protocol is compared with several recent mutual authentication protocols, the results show that, the proposed protocol has similar computational cost and memory cost with the other methods, but the proposed protocol can defense complete attacks.
出处 《电子技术应用》 北大核心 2015年第12期102-104,108,共4页 Application of Electronic Technique
基金 2014年湖南省十二五规划课题(XJK014BZY007)
关键词 单向散列函数 RFID网络 秘密身份 鲁棒性 双向认证 one-way hash function RFID network secret identity robust mutual authentication
  • 相关文献

参考文献11

二级参考文献62

  • 1徐小双,关治洪.基于混沌映射的交互式零知识证明身份认证协议[J].计算机工程与应用,2005,41(4):156-157. 被引量:2
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 3张东军,郭文成,刘莲花.基于红外超声光电编码器的室内移动小车定位系统[J].微型电脑应用,2007,23(5):1-3. 被引量:3
  • 4Chen Y,Francisco J A,Trappe W,et al.A Practical Approach toLandmark Deployment for Indoor Localization[C]∥IEEE Com-munications Society subject matter experts for publication in theIEEE SECON proceedings.2006,1:365-373.
  • 5Harter A,Hopper A.A Distributed Location System for the Ac-tive Office[EB/OL].IEEE Network,January 1994.
  • 6Bahl P,Padmanabhan V N.Radar:An in-building rf-based userlocation and tracking system[C]∥Proceedings of the IEEE In-ternational Conference on Computer Communications(INFO-COM).March 2000.
  • 7王志浩.RFID定位的室内机器人管理系统[D].南台科技大学资讯工程所,2009.
  • 8吴建中,林毓棠,陈怡云,等.透过RFID定位的寻宝机器人[EB/OL].http://eiral.csie.stut.edu.tw/node/118,2009-12-08.
  • 9JUELS A,WEIS S A.Authenticating pervasive devices with human protocols[C] // CRYPTO 2005:Proceedings of 25th Annual International Cryptology Conference,LNCS3621.Berlin:Springer-Verlag,2005:293-308.
  • 10SARMA S,WEIS S,ENGEIS D.Radio frequency identification:Secure risks and challenges[J].RSA Laboratories Cryptobytes,2003,6(1):2-9.

共引文献171

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部