期刊文献+

物联网射频识别技术的安全问题及防范策略 被引量:4

物联网射频识别技术的安全问题及防范策略
下载PDF
导出
摘要 物联网射频识别技术是利用无线射频方式进行非接触双向通信,自动识别目标对象并获取相关数据的高新技术,广泛应用于门禁系统、车辆防盗、物流管理等安全防范领域中。本文在简要介绍射频识别系统的工作原理和应用的基础上,针对射频识别系统面临的安全问题,提出相应的防范策略,以促进射频识别技术的健康发展。 Radio Frequency Identification (RFID) is one of the technology of The Internet of things. RFID systems communicate by wireless- Radio Frequency which can identify object and get data automatically. RFID is becomepervasive in our daily lives such as gate-safe system, carsafe system and goods-transfer system. This paper presents a brief description of RFID systems and their working -principle and apply;, we give an overview of defend policy for enhancement of RFID system.
作者 董爽 胡智斌
出处 《中国新技术新产品》 2011年第12期34-34,共1页 New Technology & New Products of China
关键词 物联网 射频识别技术 安全机制 非法攻击 防范策略 The Internet of things RFID systems security , nonlicet attack defend policy
  • 相关文献

参考文献3

二级参考文献34

  • 1李毅,李红波.基于RFID技术的车辆综合自动管理系统的设计研究[J].微计算机信息,2005,21(10Z):153-154. 被引量:20
  • 2Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 3Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 4Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 5Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 6Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 7Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 8Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 9Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 10Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121

共引文献229

同被引文献59

引证文献4

二级引证文献89

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部