期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
面向RFID应用的轻量级加密算法分类模型研究 被引量:4
1
作者 汪亚 魏国珩 魏巍 《计算机与数字工程》 2017年第6期1150-1155,1241,共7页
信息加密是对RFID标签进行安全防护和认证的重要手段,目前已设计出的大量轻量级加密算法,由于针对的实现平台标准不同,参数不一,缺少通用的分类模型或选取原则。为了使现有的轻量级加密算法能够满足具有不同成本、计算能力、存储空间等... 信息加密是对RFID标签进行安全防护和认证的重要手段,目前已设计出的大量轻量级加密算法,由于针对的实现平台标准不同,参数不一,缺少通用的分类模型或选取原则。为了使现有的轻量级加密算法能够满足具有不同成本、计算能力、存储空间等差异的标签的应用需求,论文设计了一种面向RFID应用的轻量级加密算法的三维分类模型,并通过实例分析验证了模型的可用性。 展开更多
关键词 RFID 轻量级算法 分类模型
下载PDF
A Lightweight Authentication Protocol Scheme for RFID Security
2
作者 wei guoheng ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2013年第6期504-510,共7页
Lightweight and safety are two essential features for large-scale application of radio frequency identification (RFID) tags. Based on the analysis of potential safety problem of RFID and the characteristics of exist... Lightweight and safety are two essential features for large-scale application of radio frequency identification (RFID) tags. Based on the analysis of potential safety problem of RFID and the characteristics of existing typical authentication protocol, a new low-cost RFID tags authentication protocol was proposed. The performance of the new protocol was analyzed. The results show that the protocol can resist replay attacks and concurrent attacks and has nontracking, authenticity, and service availability. In addition, the protocol can also reduce the storage of tags and computation burden to meet the application requirements of low-cost tags. 展开更多
关键词 low-cost tags radio frequency identification (RFID) security protocol AUTHENTICATION
原文传递
A New Relay Attack on Distance Bounding Protocols and Its Solution with Time-Stamped Authentication for RFID 被引量:2
3
作者 wei guoheng ZHANG Huanguo WANG Ya 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期37-46,共10页
Relay attack is one of the most threatening challenges against radio frequency identification(RFID) now. Distance bounding protocols have been introduced to thwart relay attacks. They form a family of challenge-resp... Relay attack is one of the most threatening challenges against radio frequency identification(RFID) now. Distance bounding protocols have been introduced to thwart relay attacks. They form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We design an effective attack against a family of such protocols to launch the spoofing attacks within effective distance successfully, which demonstrates that existing protocols cannot eliminate such attacks completely. The thesis proposes a new program with time- stamping verification to correct the defect and verify the effectiveness. 展开更多
关键词 radio frequency identification(RFID) distance bounding protocol relay attack rapid bit exchange
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部