期刊文献+

通用的无线射频识别安全认证协议分类模型 被引量:1

Universal radio frequency identification security authentication protocol classification model
下载PDF
导出
摘要 针对现有的无线射频识别(RFID)安全认证协议分类模型在分类标准比较片面,对于协议在RFID系统中的推广帮助不大的问题,提出了一种通用的RFID安全认证协议分类模型——CCS三维分类模型。该模型以协议在标签端的计算量、协议中标签与读写器的通信量以及协议能解决的RFID系统中的隐私和安全问题为标准,对于各参数制定了明确的定量划分,对协议的分类更加细化。通过实例表明,在该模型下进行分类的RFID安全认证协议比在其他分类模型下进行分类,能够帮助RFID系统方便地选择满足系统安全性以及可行性的协议。 Focusing on the issue that the Radio Frequency IDentification( RFID) security authentication protocol classification model iss one-sided and helps little to spread protocols in RFID systems, a universal RFID security authentication protocol classification model called CCS three-dimensional classificaiton model was proposed. The standard in the model is the protocol's calculation on tag side,the traffic between tags and readers and the private and secure issues that the protocol can solve. A clear quantitative division for all arguments was made and the classification for protocols was more refined. Proved gy the instances,the classification of RFID security authentication protocol in this model can help RFID systems choose a protocol which satisfies the security and feasibility.
出处 《计算机应用》 CSCD 北大核心 2015年第A02期57-61,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61472343)
关键词 无线射频识别 认证协议 分类模型 RFID系统 安全和隐私问题 Radio Frequency Identification(RFID) authentication protocol classification model RFID system security and privacy issue
  • 相关文献

参考文献16

  • 1杜云明,周杨.无线射频识别技术与应用研究[J].自动化技术与应用,2010,29(5):52-55. 被引量:36
  • 2STAAKE T. THIESSE F. FLEISCH E. Extending the EPC net- work: the potential of RFID in anti-counterfeiting[ C] // Proceedings of the 2005 ACM Symposium on Applied Computing. New York: ACM, 2005:1607 - 1612.
  • 3CHIEN H-Y. SASI: a new ultralightweight RFID authentication protocol providing strong anthentication and strong integrity[ J]. IEEE Transac- tions on Dependable and sure Computing, 2007, 4(4): 337 -340.
  • 4MrFROKOTSA A, RIEBACK M R, TANENBAUM A S. Classifying RFID attacks and defenses [ J]. Infornmtion Systems Frontiers, 2010, 12(5): 491-505.
  • 5FELDHOFER M, WOLKERSTORFER J. Strong crypto for RFID tags- a comparison of low-irower hardware implementations [ C ]// ISCAS 2007: Proceedings of the 2007 IEEE international Symposium on Cir- cuits and Systems. Piscataway: IEEE, 2007: 1839-1842.
  • 6BERBAIN C, BILLET O, ETROG J, et al. An efficient forward private RFID protocol[ C]// Proceedings of the 16th ACM Conference on Com- puter and Conmmnications Security. New York: ACM, 2009:43 -53.
  • 7CHEN M H, JAO R C, LIN Y S, et al. The development of an RFID interactive instruction system[ C]//Proceedings of the 2009 Fourth International Conference on Innovative Computing, Informa- tion and Control. Piscataway: IEEE, 2009:248-251.
  • 8PILLI-SIHVOLA E, RANTASILA K, HINKKA V, et al. The Euro- pean approach to addressing RFID privacy[J]. International Journal of Radio Frequency Identification Technology and Applications, 2014, 4(3): 260-271.
  • 9WANG Q, XIONG X, TIAN W, et al. low-eost RFID: security problems and solutions[ C]// Proceedings of the 2011 International Conference on Management and Service Science. Piscataway: IEEE, 2011: 1-4.
  • 10SARMA S E, WEISS A, ENGELS D W. RFID systems and secu- rity and privacy implications [ C]// Cryptographic Hardware and Embedded Systems-CHES 2002. Berlin: Springer, 2003: 454- 469.

二级参考文献5

  • 1蒋峻,唐日英.RFID射频标签——取代条形码的一种方案[J].科技资讯,2007,5(4):17-18. 被引量:7
  • 2H.STOCHMAN.Communication by means of reflected power[J].Proceedings of the IRE,1948,36(10):1196-1204.
  • 3J.J.BUSSGANG,P.NESBEDA,H.SAFRAN.A unifiedanalysis of range performance of CW,pulse,and pulse[J].Doppler Radar.Proceedings of the IRE,1959,47(10):1753-1762.
  • 4Klaus Finkenzeller编著,吴晓峰,陈大才译.射频识别(RFID)技术(第三版)[M].北京:电子工业出版社,2006.
  • 5徐济仁,陈家松,牛纪海.射频识别技术及应用发展[J].数据通信,2009(1):21-26. 被引量:30

共引文献35

同被引文献2

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部