期刊文献+

一个超轻量级的RFID认证协议 被引量:1

An Ultra-lightweight RFID Authentication Protocol
下载PDF
导出
摘要 对于RFID系统中标签端通常资源受限的特点,超轻量级的RFID认证协议是一种优秀的解决方法。论文针对文献[2]中提出的一种超轻量级RFID通过安全性和性能分析表明,论文提出的改进的超轻量级RFID系统。 The ultra-lightweight RFID authentication protocol is an excellent solution for the limited resource limitations of tag terminals in RFID systems. In this paper, a simple and effective attack scheme is proposed for an ultra-lightweight RFID authentication protocol proposed in literature[2], and an improved scheme is proposed based on the original literature. The analysis of security and performance analysis shows that the improved ultra-lightweight RFID authentication protocol proposed in this paper can meet the ultra-lightweight RFID authentication system with limited resource at the tag terminal.
作者 付俊 严新荣 付强 FU Jun;YAN Xinrong;Fu Qiang(722th Research Institute,CSIC,Wuhan 430205)
出处 《舰船电子工程》 2019年第3期107-110,共4页 Ship Electronic Engineering
关键词 无线射频识别 资源受限 超轻量级 认证协议 RFID limited resources ultra-lightweight authentication protocol
  • 相关文献

参考文献6

二级参考文献77

  • 1鞠伟成,俞承芳.一种基于动态二进制的RFID抗冲突算法[J].复旦学报(自然科学版),2005,44(1):46-50. 被引量:42
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 4Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 5Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 6Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 7Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 8Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 9Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 10Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140

共引文献148

同被引文献12

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部