期刊文献+

基于Hash函数的RFID安全认证协议研究 被引量:2

Research on RFID Security Authentication Protocol Based on Hash Function
下载PDF
导出
摘要 RFID得到了越来越广泛的关注和应用,但是其存在安全和隐私保护的问题值得重视和关注。在现有RFID安全认证协议的基础上,分析了3种典型的Hash函数认证协议的缺陷,提出了一种基于Hash函数的双向认证协议,较好地解决了RFID的安全隐患和高效低成本问题。该协议具有抗重放、抗分析、防伪造、防跟踪等特性,并且适用于大规模的应用系统。 RFID is gaining more widespread attention and application,but the existence of security and privacy protection issues is worthy of attention and concern.On the basis of the Hash function-based RFID safe authentication agreement,This paper has analyzed three typical Hash function agreement authentication flaws,and proposed an improved bidirectional security authentication agreement,which has solved the RFID safe hidden danger and highly effective low cost problem well.This agreement has the characteristics of anti-replay,anti-analysis,anti-counterfeiting,anti-tracking.etc,and is suitable for the large-scale application system.
出处 《电脑开发与应用》 2011年第7期6-8,11,共4页 Computer Development & Applications
关键词 RFID 隐私 安全协议 HASH函数 RFID privacy security protocol Hash function
  • 相关文献

参考文献7

二级参考文献85

  • 1李晓东.射频识别技术中的隐私安全问题及策略[J].微电子学与计算机,2005,22(9):137-140. 被引量:24
  • 2廖晓勇,连一峰,戴英侠.网络安全检测的攻击树模型研究[J].计算机工程与应用,2005,41(34):108-110. 被引量:4
  • 3王信,薛小平,张思东.RFID系统数据安全研究[J].信息技术与信息化,2006(1):51-53. 被引量:11
  • 4周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 5欧阳麒,蒋兴浩,孙锬锋.一种基于相互认证的安全RFID系统[J].信息安全与通信保密,2006,28(12):142-144. 被引量:14
  • 6International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 7Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 8Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 9Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 10Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001

共引文献453

同被引文献11

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部