期刊文献+

基于假名标识的加密RFID系统无线密钥生成协议 被引量:5

Wireless Key Generation Protocol for Encrypted RFID System Based on Pseudonym Logo
下载PDF
导出
摘要 针对无线射频识别(RFID)系统密钥生成过程中存在的密钥托管、无线信道不安全和标签成本过高的问题,提出一种RFID系统密钥无线生成协议。在前、后向信道均可被窃听的假设前提下,通过引入假名标识以防止秘密信息泄露,仅采用简单位运算降低标签成本与计算量,利用异或和移位运算对通信信息进行加密传输,从而保证协议的安全性,并运用GNY逻辑对协议进行形式化证明。分别在单标签个体密钥生成、批量标签个体密钥生成以及群组标签组密钥生成3种应用下对协议进行安全与性能分析,结果表明,该协议具有较高的安全性和较低的成本。 In view of the problems including the key escrow,the insecurity of the wireless channel and the high cost of the tag in the key generation process of Radio Frequency Identification (RFID) system, an wireless key generation protocol for RFID system is proposed. On the premise that the forward and backward channels can be eavesdropped, the paper introduces the pseudonym logo to prevent the disclosure of secret information. The paper only uses simple bit operations to reduce the tag cost and computation, and it uses Exclusive OR (XOR) and shift operations to encrypt and transmit information, which aims to ensure the security of protocol. The proposed protocol is formally proved by using GNY logic. The security and performance of the protocol are analyzed under three kinds of applications, which are the single label individual key generation, batch label key generation and group label key generation. It is proved that the proposed protocol has higher security and lower cost.
出处 《计算机工程》 CAS CSCD 北大核心 2017年第8期173-177,183,共6页 Computer Engineering
基金 国家自然科学基金(61502108 61273118) 广东省重大科技专项(2014B010111007) 广东省公益研究与能力建设专项(2016A010101027)
关键词 无线射频识别 密钥生成 密钥托管 假名标识 加密 窃听 GNY逻辑 Radio Frequency Identification (RFID) key generation key escrow pseudonym logo encryption eavesdrop GNY logic
  • 相关文献

参考文献9

二级参考文献101

  • 1王让定,陈金儿,朱斌.基于MCLT变换的音频数字水印技术[J].计算机研究与发展,2004,41(8):1398-1403. 被引量:2
  • 2张庆胜,叶震,周兵斌,李志亮,管水能.椭圆曲线加密算法在PKI中的应用[J].计算机工程与设计,2004,25(7):1229-1231. 被引量:7
  • 3周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 4王连强,吕述望,韩小西.RFID系统中安全和隐私问题的研究[J].计算机应用研究,2006,23(6):16-18. 被引量:17
  • 5Hideki I, Seonghan S, Kobara K. Authenticated Key Exchange for Wireless Security[C]//Proc. of IEEE Wireless Communications & Networking Conference. Tokyo, Japan: IEEE Computer Society, 2005.
  • 6Mackenzie E More Efficient Password Authenticated Key Exchange[C]//Proc. of the 2001 Conference on Topics in Cryptology. London, UK: Springer-Verlag, 2001.
  • 7Ryu Eun-Kyung, Kim Kee-Won, Yoo Kee-Young. A Simple Key Agreement Protocol[C]//Proc. of the 37th Annual International Carnahan Conference. Taipei, China: IEEE Computer Society, 2003.
  • 8Blake-Wilson S, Johnson D, Menezes A. Key Agreement Protocols and Their Security Analysis[C]//Proc. of the 6th IMA International Conference on Cryptography and Coding. [S. l.]: Springer-Verlag, 1997.
  • 9D.Kirovski,H.S.Malvar.Spread-spectrum watermarking of audio signals.IEEE Trans.Signal Processing,2003,51 (4):1020~ 1033
  • 10G-J Yu,C-S Lu,H.Liao.A message-based cocktail watermarking system.Pattern Recognition,2002,36(4):957~968

共引文献78

同被引文献30

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部