期刊文献+

物联网射频识别技术安全机制研究

Research on RFID Security Mechanism Based on Internet of Things
下载PDF
导出
摘要 随着科学技术的发展,物联网的研究和应用也越来越广泛,RFID作为物联网的重要组成部分,其安全问题一直没有得到应有的重视。本文首先阐述了RFID系统及其存在的安全问题,然后讨论了现有的安全防御策略,最后针对物联网和RFID的特点,设计了一种混合加密模式。 With the development of science and technology, the research and application of Internet of things are becoming more and more popular. As an important part of the Internet of things, the security issue of RFID has not received the proper attention.This paper states the RFID system and its security problems, and discusses the existing strategies of security defense, and finally designs the mixed encryption mode according to the characteristics of the Internet of things and RFID.
作者 卢炼
出处 《湖南工业职业技术学院学报》 2015年第6期6-8,共3页 Journal of Hunan Industry Polytechnic
关键词 RFID 物联网 加密机制 安全机制 RFID Internet of things encryption mechanism security mechanism
  • 相关文献

参考文献3

二级参考文献28

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2李莉,刘建伟.RFID安全保密技术研究进展[J].信息安全与通信保密,2007,29(8):165-167. 被引量:9
  • 3Moessner M,Khan G N.Secure authenticationscheme for passive C1G2 RFID tags[J].ComputerNetworks,2012,56(1):272-286.
  • 4Lee Y C.Two utralightweight authentication proto-cols for low-cost RFID tags[J].Applied Mathematics&Information Sciences,2012,6(2):425-431.
  • 5Fu J,Wu C,Chen X,et al.Scalable pseudo randomRFID private mutual authentication[C]∥2nd IEEEInternational Conference on Computer Engineeringand Technology(ICCET).Chengdu:IEEE Press,2010:497-500.
  • 6Habibi M H,Gardeshi M,Alaghband M.Cryptanal-ysis of two mutual authentication protocol for low-cast RFID[J].International Journal of Distributedand Parallel Systems,2011,2(1):103-114.
  • 7Le T,Burmester M,Medeiros B.Universally com-posable and forward secure RFID authentication andauthenticated key exchange[C]∥2nd ACM Symposi-um on Information,Computer and CommunicationsSecurity.Washington:ACM Press,2007:242-252.
  • 8Vahedi E,Ward R K,Blake F.Security analysis andcomplexity comparison of some recent lightweightRFID protocols[C]∥4th International Conference onComputational Intelligence in Security for InformationSystems.Berlin:Springer Press,2011:92-99.
  • 9Ahmadian Z,Salmasizadeh M,Aref M.Desynchro-nization attack on RAPP ultralightweight authentica-tion protocol[J].Information Proceeing Letters,2013:113(7):205-209.
  • 10Gao lijun,Ma Maode,Shu Yantai,et al.A securityprotocol resistant to intermittent position trace at-tacks and desynchronization attacks in RFID systems[J].Wireless Personal Communications,2012,67(7):1-17.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部