期刊文献+

基于Hash函数的RFID认证协议改进设计 被引量:4

An Improved Design of RFID Authentication Protocol Based on Hash Function
下载PDF
导出
摘要 提出了一种改进的RFID认证协议,它具有安全、高效的优点。首先,介绍了系统的认证需求;接着,对Hash-Lock协议与Hash链协议进行了分析;然后,对改进协议流程进行详细地说明并对其安全性进行分析;最后,对三种协议的安全性与高效性进行对比,说明改进协议具有较好的安全性和高效性。 An improved RFID authentication protocol is provided, its virtue is secure and effective. At first, the authentication re-quirements are introduced; then Hash-Lock protocol and Hash chain protocol are analyzed, and then the flow of the improved proto-col is described in detail, and the security of it is analyzed. At last, through comparing with other protocols from security and effi-ciency, it is proved that the improved protocol is security and efficiency.
出处 《微计算机信息》 北大核心 2008年第11期214-216,共3页 Control & Automation
关键词 射频识别系统 认证协议 HASH函数 RFID Systems Authentication Protocol Hash Function
  • 相关文献

参考文献6

  • 1[1]游战清,李苏剑.无线射频识别技术(RFID)理论与应用[M],电子工业出版社.2005:13-17 被引量:2
  • 2袁昌立.集成RFID的智能建筑系统研究[J].微计算机信息,2007,23(01Z):264-265. 被引量:7
  • 3[3]Steve Bono,Matthew Green,Adam Stubblefield,Ari Juels,Avi Rubin,Michael Szydlo.Security Analysis of a Cryptographically Enabled RFID Device[C],2005,1 被引量:1
  • 4[4]Sanjay E.Sarma,Stephen A.Weis,Daniel W.Engels.RFID Systems and Security and Privacy Implications.Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems[C] (CHE 2002). 被引量:1
  • 5[5]Stephen A.Weis,Sanjay E.Sarma,Rivest R.L.,Daniel W.Engels.Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems.Proceeding of the 1st Intermational Conference on Security in Pervasive Computing[C],2003 被引量:1
  • 6[6]Miyako Ohkubo,Koutarou Suzuki,Shingo Kinoshita.Hash-chain based Forward-Secure Privacy Protection Scheme for Low-cost RFID.Proceedings of the 2004 Symposium on Cryptography and Information Security[C] (SCIS 2004). 被引量:1

二级参考文献5

  • 1郎为民,雷承达,张蕾.RFID技术安全性研究[J].微计算机信息,2006(06Z):269-271. 被引量:28
  • 2G.Avoine and Ph.Oechslin,"A scalable and provable secure hash based REID protocol",International Workshop on Pervasive Computing and Comunications Security",PerSec 2005,pp.110-114.IEEE,2005 被引量:1
  • 3Wolfgang K et al.,"Communication Systems for Building Automation and Control",Proceedings of the IEEE,Vol.93,No.6 pp.1178-1203,June 2005 被引量:1
  • 4Sanjay E.Sarma,et al.,"RFID Systems and Security and Privacy Implications",CHES 2002,Lecture Notes in Computer Science 2523,pp.454-469.2002 被引量:1
  • 5EPCglobal.“The EPCglobal Network:Overview of Design,Benefits and Security”,http://www.epcglobalinc.org/Sep.2004 被引量:1

共引文献7

同被引文献23

  • 1杨海东,杨春.RFID安全问题研究[J].微计算机信息,2008,24(8):238-240. 被引量:34
  • 2李莉,刘建伟.RFID安全保密技术研究进展[J].信息安全与通信保密,2007,29(8):165-167. 被引量:9
  • 3Sarma S. E., Weis S.A., Engels D.W. Radio-frequency identification: Secure risks and challenges. RSA Laboratories Crypto bytes,2003, 6(1):2-9 被引量:1
  • 4Weis S.A, Security and privacy aspects of low-cost radio frequency identification systems. In: Proceedings of the 1st International Conference on Security in Pervasive Computing. Berlin,2004: 201-212 被引量:1
  • 5Ohkubo M, Hash-chain based forward-secure privacy protection scheme for low-cost RFID. Proceedings of the 2004 Symposium on Cryptography and Information Security, Sendai, 2004:719-724 被引量:1
  • 6Henrici D, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops, Washington, D, USA, 2004:149-153 被引量:1
  • 7陈信刚,李超锋.移动RFID网络的安全性研究[J].广东通信技术,2007,27(11):14-17. 被引量:5
  • 8Melanie R Rieback, Bruno Crispo, Andrew S Tanenbaum. The Evolution of RFID security[ J]. Pervasive Computing IEEE,2006,5 (1): 62 - 69. 被引量:1
  • 9Gong L, Needham R, Yahalom R. Reasoning about Belief in Cryptographic mtocols[ C]//Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy. Oakland: IEEE Computer Society Press, 1990: 234- 248. 被引量:1
  • 10Ari Juels. RFID Security and Privacy:A Research Survey[J]. IEEE Journal on Selected Areas in Communications,2006,24 (2) :381 - 394. 被引量:1

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部