期刊文献+

物联网RFID系统隐私保护三方认证协议 被引量:15

A privacy preserving three-party authentication protocol for RFID systems in the internet of things
下载PDF
导出
摘要 设计一种适用于物联网射频识别(radio frequency identification,RFID)系统被动式低成本标签的隐私保护认证协议.采用对称加密算法、Hash函数及随机数相结合的方式,实现标签、阅读器与后台数据库三方认证,并在认证过程中建立会话密钥,防止标签携带者被非法阅读器访问及秘密追踪.GNY逻辑对协议分析证明了协议的安全性及可达到的认证目的.与He等人的AKAP和Chen等人提出的协议相比,该协议在标签计算量、通信次数及实现功能方面具有一定的综合优势. For radio frequency identification(RFID) systems in the Internet of things, a privacy preserving au- thentication protocol was designed using passive low-cost tags. In this proposed protocol, the authentication be- tween the tag, reader and backend database is implemented through a symmetric cryptosystem, a hash function, and a random number generator. It is also compliant with a shared session key between the reader and the tag. Furthermore, it protects legal tags from illegal access and clandestine tracking. The security of the protocol is proved by GNY logic formal analysis. This protocol has more advantages for computing, communication and func- tions compared with AKAP and the protocol proposed by Chen.
出处 《深圳大学学报(理工版)》 EI CAS 北大核心 2012年第2期95-99,共5页 Journal of Shenzhen University(Science and Engineering)
基金 国家自然科学基金资助项目(61001058 61171072)~~
关键词 数据安全 物联网 射频识别 隐私保护 认证协议 会话密钥 GNY逻辑 data security internet of things radio frequency identification privacy preserving authenticationprotocol session key GNY logic
  • 相关文献

参考文献13

  • 1Atzori L, Iera A, Morabito G. The interact of things: a survey [J]. Computer Netwworks, 2010, 54(15): 2787- 2805. 被引量:1
  • 2Lee H J, Kim J Y. Privacy threats and issues in mobile RFID [ C ]//Proceedings of the First International Confer- ence on Availability, Reliability and Security. Los Alami- tos(USA) : IEEE Press, 2006: 510-514. 被引量:1
  • 3Juels A. RFID security and privacy: a research survey [ J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2) : 381-394. 被引量:1
  • 4Alomair B, Poovendran R. Privacy versus scalability in ra- dio frequency identification systems [ J ]. Computer Com- munication, 2010, 33( I8): 2155-2163. 被引量:1
  • 5Sadeghi A R, Visconti I, Wachsmann C. Location privacy in RFID applications [ C ]// The 1st International Work- shop on Privacy in Location-based Applications. Berlin: Springer-Verlag, 2009 : 127-150. 被引量:1
  • 6Rhee K, Kwak J, Kim S, et al. Challenge-response basedRFID authentication protocol for distributed database envi- ronment [ C]//The 2nd international Conference on Secu- rity in Pervasive Computing. Berlin : Springer-Verlag, 2005 : 70-84. 被引量:1
  • 7Chen C L, Jan J K, Chie C F. Based on mobile RFID de- vice to design a secure mutual authentication scheme for market application [ C ]// International Conference on Broadband, Wireless Computing, Communication and Ap- plications. Los Alamitos(USA) : IEEE Computer Society, 2010 : 423-428. 被引量:1
  • 8Henrici D, Muller P. Hash-based enhancement of location privacy for radio-frequency identification devices using var- ying identifiers [ C]// The 2nd IEEE Annual Conference on Pervasive Computing and Communications. Los Alami- tos(USA) : IEEE Computer Society, 2004 : 149-153. 被引量:1
  • 9He L, Gan Y, Li N N, et al. A Security- provable authen- tication and key agreement protocol in RFID system [ C]// The 3rd International Conference on Wireless Communica- tions, Networking and Mobile Computing. New York: IEEE Press, 2007: 2078-2080. 被引量:1
  • 10Zhou S J, Zhang Z, LUO Z W, et al. A lightweight anti- desynchronization RFID authentication protocol [ J 1. Infor- mation System Frontiers, 2010, 12(5): 521-528. 被引量:1

同被引文献159

引证文献15

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部