期刊文献+

一种新的无需服务器支持的RFID认证协议

A Novel Serverless RFID Authentication Protocol
下载PDF
导出
摘要 近年来,各种基于无线射频识别(RFID)技术的物联网系统得到大量应用,如何保护用户的隐私和安全也随之变得越来越重要。在传输信息前进行认证是提高系统安全性的一个重要方法。现有的RFID认证协议大多需要一个中心服务器来保存该系统所有RFID标签的相关信息,但是这类协议在认证时读写器必须与服务器保持实时连接。很多覆盖区域比较大的物联网系统很难实现这种实时性,保证读写器与服务器之间通信的安全也需要额外的开销。针对这两个问题,提出了一种新的无需服务器支持的RFID认证协议,该协议实现方便,同时提供了很好的安全性和隐私性。通过分析可知,它可以抵御各种常见攻击。 In recent years, the Internet of Things (IOT) systems based on RFID have gained great popularity. Hence, it becomes more and more important to protect users' privacy and security. Authentication before communication is helpful to enhance system security. Most existing RFID authentication protocol needs a central database. But it is difficult to maintaina security real time connection between database and reader.A novel serverless protocol was proposed to address these problems. This protocol is proved to be resistant to various common attacks by performance evaluation.
出处 《微型电脑应用》 2013年第5期61-64,共4页 Microcomputer Applications
关键词 射频识别 认证 无需服务器支持 隐私 安全 RFID Authentication Serverless Privacy Security
  • 相关文献

参考文献5

  • 1EPeris-Lopes, J.C.Hemandez-Castro, J.M.ETapiador, and A.Ribagorda, "M2Ap: aminimalistmutual authenti- cation protocol for low-cost RFID tags"[C] in Proc. 2006InternationalConference on Ubiquitous Intelli- gence and Computing, pp, 912-923.
  • 2YunTian, Gongliang Chen, and Jianhua Li,"RAPP: A New Ultralightweight RFID Authentication Protocol with Permutation"[J] IEEE Communication Let- ters, 2012.16(5), 702-705.
  • 3袁署光,戴宏跃,赖声礼.基于Hash函数的RFID认证协议[J].计算机工程,2008,34(12):141-143. 被引量:18
  • 4Chiu C.Tan, Bo Sheng, Qun Li, "Secure andServerless RFID Authentication and Search Protocols"[J], IEEE Transaction on Wireless Communications, 2008.7(4), 1400-1407.
  • 5SowmyaMyneni, SatyajayantMisra, GuoliangXue, "SAMA: Serverless Anonymous Mutual Authentication for Low-Cost RFID Tags"[C], IEEE ICC 2011 pro- ceedings.

二级参考文献4

  • 1Osaka K, Takagi T. An Efficient and Secure RFID Security Method with Ownership Transfer[C]//Proc. of Computational Intelligence and Security. Guangzhou, China: [s. n.], 2006: 1090-1095.
  • 2Hun-Wook K, Shu-Yun L, Hoon-Jae L. Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security[C]//Proc. of Conference on Hybrid Information Technology. Cheju Island, Korea: [s. n.], 2006: 718-723.
  • 3Zhang Lan, Zhou Huaibei, Kong Ruoshan. An Improved Approach to Security and Privacy of RFID Application System[C]//Proc. of Wireless Communications, Networking and Mobile Computing Conference. Wuhan, China: [s. n.], 2005: 1195-1198.
  • 4Dimitriou T. A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks[C]//Proc. of Conference on Security and Privacy for Emerging Areas in Communications Networks. Athens, Greece: [s. n.], 2005: 59-66.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部