期刊文献+

基于哈希的RFID安全协议的研究 被引量:3

Research of RFID Cryptographic Protocol based on the Hash
下载PDF
导出
摘要 随着RFID技术的广泛应用,出现了一系列的安全问题,如窃听、重放攻击等等。这些安全问题严重阻碍了RFID技术进一步的发展。鉴于此,在阅读了前人提出的安全认证协议相关文献的基础上,经过分析研究,提出了优化的哈希安全认证协议,该协议更加适合一些场合的安全要求,并通过BAN逻辑规则加以证明,发现其安全性能够满足需求。 With the wide application of P, FID technology, a number of security problems appear,such as eavesdropping and replay attacks. These security issues is a serious impediment to the further development of P, FID technology. In view of this,based on the previous security authentication protocol,careful analysis,try to figure out,optimized hash security authentication protocol,the agreement is more suitable for the security requirements of some occasions,and proved by BAN logic rules,found that its safety can meet the needs.
作者 卢欢欢 李飞
出处 《计算机安全》 2013年第2期6-10,共5页 Network & Computer Security
基金 中国气象局气象探测中心行业专项项目(项目编号GYHY201006051)
关键词 哈希 RFID 安全协议 BAN逻辑 Hash RFID Cryptographic BAN logic
  • 相关文献

参考文献15

二级参考文献65

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3Yao Jun Zeng Guihua.Enhanced NTRU cryptosystem eliminating decryption failures[J].Journal of Systems Engineering and Electronics,2006,17(4):890-895. 被引量:3
  • 4曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 5Burrows M A,Needham R.A Logic of Authentication [J].ACM Transactions on Computer Systems,1990,8(1):18-36.
  • 6Ohkubo M,Suzuki K, Kinoshita S. Cryptographic Approach to Privacy-Friendly" Tags [C]//Proc. of RFID Privacy Workshop,USA MIT, 2003.
  • 7Sarma S.E.,Weis S.A.,Engels D.W..Radio frequency identification:Secure risks and challenges [J].RSA Laboratories Cryptobytes, 2003,6(1):2-9.
  • 8Dimitriou T.A lightweight RFID protocol to protect against traceability and cloning attacks[C] //Secure Comm:Conference on Security and Privacy for Emerging Areas in Communication Networks.Athens,Greece:IEEE Press,2005:59-66.
  • 9Song B,Mitchell C J.RFID authentication protocol for low-cost tags[C] //Proceedings of the 1st ACM Conference on Wireless Network Security,Alexandria,Virginia,USA.ACM Press,2008:140-147.
  • 10Chien Hung-yu,Chen Che-hao.Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards[J].Computer Standards & Interfaces,2007,29(2):254-259.

共引文献94

同被引文献44

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2雷吉成.物联网安全技术[M].北京:电子工业出版社,2012:34-35.
  • 3Tan C C, Sheng B, and Li Q. Secure and severless RFID authen- tication and search protocols[ C ] //Proc of the 5th Annual IEEE International Conference on Pervasive Computing and Communi- cations, New York :IEEE ,2007:24 -29.
  • 4Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, etal. Se- cure tag search in RFID systems using mobile readers [ J ]. IEEE Transactions on Dependable and Secure Computing ,2014, (99) :.
  • 5Juels A,Pappu R. Squealing Euros:Privacy Protection in RFID- Enabled Banknotes [ C ]. Financial Cryptography. Springer Ber- lin Heidelberg,2003 : 103 -121.
  • 6Go|le P, Jakobsson M, Juels A. Syverson universal re-eneryption for mixnets [ C ]//The Cryptographers' Track at the RSA Confe- rence 2004, San Francisco, CA, USA ,2004 : 163 -178.
  • 7Samad Rostampour, Mojtaba Eslamnezhad Namin, Mehdi Hos- seinzadeh. A novel mutual RFID authentication protocol with low complexity and high security[J]. International Journal of Modem Education and Computer Science ( IJMECS ) , 2014,6 ( 1 ) : 17 - 24.
  • 8Hua Man, Li Yanling. Security authentication protocol analysis and security issue of RFID [ C ]Jj2011 2nd International Confe- rence on Management Science and Engineering, MSE 2011, En- gineering Technology ,2011.
  • 9Blom R. An optimal class of symmetric key generation system- s[ C]//Proc of the Eurocrypt84 Workshop on Advances in Cryp- tology: Theory and Application of Crypto-graphic Techniques, Paris, France, 1984:335 -338.
  • 10Dai H Y, Xu H B. Key predistribution approach in wireless sensor networks using LU matrix [ J]. IEEE Sensors Journal, 2010, 10(8) :1399 -1409.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部