期刊文献+

基于RFID的物联网安全需求研究 被引量:26

下载PDF
导出
摘要 利用无线射频识别技术(RFID:Radio Frequency IDentification)来建立物联网系统是当前物联网的主流模式之一。分析了基于RFID的物联网系统结构,详细阐述了RFID技术的局限性给物联网带来的安全威胁,并提出了基于RFID的物联网应满足的安全需求。
出处 《计算机安全》 2011年第1期75-79,共5页 Network & Computer Security
基金 国家科技支撑计划课题(编号:2008BAH22B04) 信息网络安全公安部重点实验室(公安部第三研究所)开放基金资助课题 复旦大学计算机学院"学术骨干发展基金"的支持
  • 相关文献

参考文献20

  • 1International Telecommunication Union UIT ITU Internet R, eports 2005: The Internet of Things 2005.
  • 2A. Sarma, J. Girao. Identities in the Future Internet of Things. In: Wireless Personal Communications, Volume 49/2009, Springer Netherlands, 2009.
  • 3Juels Ari. RFID Security and Privacy: A Research Survey. Selected Areas in Communications, IEEE, 2006.
  • 4Pedro Peris-Lopez, dulio Cesar Hernandez-Oastro, Juan M. EstevezTa,niador, and Arturo Ribagorda. R, FID Systems: A Survey on Security Threats and Proposed Solutions, In: Personal Wireless Comnunications, Volume 4217/2006, Springer Berlin, Heideberg , 2006.
  • 5S. Weis. Security parallels between people and pervasive devices. In PERSEC'05. IEEE Computer Society Press, 2005, pages 105-109.
  • 6周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 7S. A. Weis, S Security and privacy identification systems. Sarma, R. P, ivest, and D. Engels. aspects of low cost radio frequency n First International Conference on Security in Pervasive Computing, ,2003.
  • 8OLESHCHUK V. Internet of things and privacy preserving technologies. In: Proc of 1st international Conference Communication, Vehicular Technology, Information on Wireless Theory and Aerospace a Electronic Systems Technology, 2009:336-340.
  • 9杨永志,高建华.试论物联网及其在我国的科学发展.http://d.g.wanfangdata.com.cn/Periodical_zgltjj201002013.aspx.
  • 10A. Mitrokotsa, M. R. Reback, and A. S. Tanenbaum Classfying RFID Attacks and Defenses, Information Systems Frontiers Special Issue on RFID, 2009.

二级参考文献28

  • 1Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 2Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 3Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 4Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 5Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 6Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 7Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 8Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 9Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
  • 10Saito J,Ryou J.C,Sakurai K..Enhancing privacy of universal re-encryption scheme for RFID tags.In:Yang L.T,Guo M,Gao G.R,Jha N.K.eds..Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2004).Lectures Notes in Computer Science 3207.Berlin:Springer-Verlag,2004,879~890

共引文献210

同被引文献133

引证文献26

二级引证文献163

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部