期刊文献+

基于RFID系统的安全性问题研究 被引量:8

Study of Security Problem Based on RFID System
下载PDF
导出
摘要 随着RFID技术的飞速发展与广泛应用,RFID系统的自身安全威胁及基于其的恶意代码也在快速发展。为了更好地对抗安全威胁和恶意代码,需要透彻地分析了解其原理。详细分析了当前RFID系统的自身安全问题及现有的攻击手段,给出了相应的防范措施;并根据RFID系统的特点,提出了基于RFID系统的恶意代码免疫模型。 With the rapid development and wide application of RFID technology,RFID system’s security threats and malware of them also develop quickly.In order to prevent from them,we need to know their theories better.This paper particularly analyzed existing security problems and malware of RFID system,and gave some defense measures.At last,according to the characters of RFID system,the paper proposed a malware’s immune model based on RFID system.
机构地区 电子工程学院
出处 《计算机科学》 CSCD 北大核心 2012年第B06期214-216,共3页 Computer Science
关键词 RFID技术 恶意代码 免疫模型 安全 攻击 RFID technology; Malware; Immune model; Security; Attack
  • 相关文献

参考文献8

  • 1张秋剑..RFID系统环节的攻击与威胁的分析及解决方案的设计[D].上海师范大学,2010:
  • 2Rieback M,Crispo B,Tanenbaum A. Is your cat infected with a computer virus [J]. IEEE Percom,2006. 被引量:1
  • 3射频识别[EB/OL].http://zh.wikipedia.org/wiki/RHD,2011-08-23. 被引量:1
  • 4Karygiannis T, Eydt B, Barber G. Guidance for Securing RFID Systems [J]. National Institute of Standards and Technology, 2007 : 7-30. 被引量:1
  • 5Bono S C, Green M, Stubblefield A. Security Analysis of a Cryptographically-enabled RFID Device[C]//14th USENIX Security Symposium. 2005. 被引量:1
  • 6Sulaiman A, Mukkamala S, Sung A. SQL infections through RFID [J]. J Comput Virol, 2008,4: 347-356. 被引量:1
  • 7Shankarapani M K, Sulaiman A, Mukkamala S. Fragmented rnalware through RFID and its defenses [J]. J Comput Virol, 2009,5:187-198. 被引量:1
  • 8杨海东,杨春.RFID安全问题研究[J].微计算机信息,2008,24(8):238-240. 被引量:34

二级参考文献21

  • 1吴永祥.射频识别(RFID)技术研究现状及发展展望[J].微计算机信息,2006(11Z):234-236. 被引量:119
  • 2[1]A.Juels,RFID Security and Privacy:A Research Survey,IEEE Journal on Selected Areas in Communications,Vol.24,No.2,February 2006,381-391 被引量:1
  • 3[2]http://www.ccw.com.cn/news2/securo/htm2003/20030828-13T9U.htm 被引量:1
  • 4[3]A.Juels:Yoking-Proofs for RFID Tags,Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops 2004 被引量:1
  • 5[4]S.E.Sarma,S.A.Weis,D.W.Engels:Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2-9 被引量:1
  • 6[5]S.A.Weis,S.E.Sarma,R.L.Rivest,D.W.Engels:Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D.,Miler G.,Stephan W.,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201-212 被引量:1
  • 7[6]A Juels.,R.L.Rivest,M.Szydlo:The blocker tag:Selective blocking of RFID tags for consumer Privacy.In:Proceeding of the 10th ACM Conference on Computer and Communication Security (CCS2003),Washington,DC,USA,2003,103-111 被引量:1
  • 8[8]A Juels,R Pappu,S.Euros:Privacy Protection in RFID-enabled Banknotes,Financial Cryptography' 03,2003.134-145 被引量:1
  • 9[9]J.Zhai,C.M.Park,and G.N.Wang:Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification.In:M.Gavrilova et al.Ed.Procedure ICCSA 2006,LNCS 3983,2006,296-305 被引量:1
  • 10[10]S.E.Sarma,S.A Weis.,D.W.Engels:RFID systems and security and privacy implications.In:Kaliski B.S.,Koc C.K.,Paar C.eds..Proceedings of the 4th International Work-shop on Crypto graphic Hardware and Embedded Systems (CHES2002).Lectures Notes in Computer Science2523.Bedim Springer-Verlag,2003,454-469 被引量:1

共引文献33

同被引文献73

引证文献8

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部