期刊文献+

RFID系统信息安全分析 被引量:1

Analysis of RFID system information security
下载PDF
导出
摘要 随着物联网技术的广泛应用,作为其感知层重要支撑技术之一的无线射频识别(RFID)技术得到了长足发展,但由于发展过快,对其安全机制的研究过于滞后,鉴于RFID成本限制等原因,并没有形成一种非常有效的安全机制,对未来这项技术的大量应用埋下了隐患。 With the wide application of Internet of things technology,radio frequency identification of the sensing layer is one of the important supporting technologies (RFID) technology has made considerable progress,but due to the development of fast,research on its security mechanism is too lag,whereas RFID cost constraints and other reasons,has not formed a very effective security mechanism,the future application of this technology is a hidden trouble.
作者 潘宏斌
出处 《电子测试》 2014年第5X期83-85,共3页 Electronic Test
关键词 RFID 物联网 信息安全 安全机制 RFID Internet of things Information security Security mechanism
  • 相关文献

参考文献4

二级参考文献26

  • 1Yao Jun Zeng Guihua.Enhanced NTRU cryptosystem eliminating decryption failures[J].Journal of Systems Engineering and Electronics,2006,17(4):890-895. 被引量:3
  • 2Dimitriou T.A lightweight RFID protocol to protect against traceability and cloning attacks[C] //Secure Comm:Conference on Security and Privacy for Emerging Areas in Communication Networks.Athens,Greece:IEEE Press,2005:59-66.
  • 3Song B,Mitchell C J.RFID authentication protocol for low-cost tags[C] //Proceedings of the 1st ACM Conference on Wireless Network Security,Alexandria,Virginia,USA.ACM Press,2008:140-147.
  • 4Chien Hung-yu,Chen Che-hao.Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards[J].Computer Standards & Interfaces,2007,29(2):254-259.
  • 5Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.Cryptanalysis of a novel authentication protocol conforming to EPCC1G2 standard[J].Computer Standards & Interfaces,2009,31(2):372-380.
  • 6Kang S Y,Lee D G,Lee I Y.A study on secure RFID mutual authentication scheme in pervasive computing environment tJ].Computer Communications,2008,31(18):4248-4254.
  • 7Kaya S V,Sava E.Public key cryptography based privacy preserving multi-context RFID infrastructure[J].Ad Hoc Networks,2009,7(1):136-152.
  • 8Paise R I,Vaudenay S.Mutual authentication in RFID:Security and privacy[C] //Proceedings of the 2008 ACM Symposium on Information,Computer and Communications Security 2008,Tokyo,Japan.ACM Press,2008:292-299.
  • 9Eun-Kyung R,Takagi T.A hybrid approach for privacy-preserving RFID tags[J].Wireless Communications.Computer Standards & Interfaces,2009,31(4):812-815.
  • 10Chen Ya-lin,Jue-Sam C,Sun Hung-min.A novel mutual anthentication scheme based on quadratic residues for RFID systems[J].Computer Networks,2008,52(12):2373-2380.

共引文献27

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部