期刊文献+

一种无后端数据库的RFID安全认证协议 被引量:4

New serverless authentication protocol for RFID
下载PDF
导出
摘要 针对使用后端数据库模式的无线射频识别(RFID)安全协议的弊端,基于已有的无后端数据库安全协议,提出了一个改进的无后端数据库的RFID安全认证协议。通过安全性分析和效率比较,证明该协议不仅实现了真正的双向认证和标签匿名,而且使标签端只需进行一次哈希运算,大大提高了系统的效率和可行性。因此该协议与已有的无后端数据库安全协议相比,更安全、更高效。 In order to overcome the shortcomings of radio frequency identification (RFID) authentication protocols using the back-end database model, this paper proposed an improved serverless RFID authentication protocol based on the existed serverless protocols. The security analysis and efficiency comparison proved that the proposed protocol not only realized the au- thentic mutual authentication and tag anonymity, but also made the tag only need one hash operation which highly improved the efficiency and feasibility of the system. So the protocol is more secure and more efficient compared with the existed serverless protocols.
出处 《计算机应用研究》 CSCD 北大核心 2014年第10期3137-3140,共4页 Application Research of Computers
基金 上海市重点科技攻关计划资助项目(11391901800) 上海市自然科学基金资助项目(11ZR1415700)
关键词 无线射频识别 安全认证协议 无后端数据库 哈希运算 RFID security authentication protocol serverless hash operation
  • 相关文献

参考文献17

  • 1SARMA S, WEIS S, ENGELS D.RFID systems and security and privacy implications[C]//Proc of the 4th International Workshop on Cryptographic Hardware and Embedded Systems.Berlin:Springer,2002:454-469. 被引量:1
  • 2WEIS S A, SARMA S E, RIVEST R L.Security and privacy aspects of low-cost radio frequency identification systems[C]//Proc of the 1st Conference on Security in Pervasive Computing.Berlin:Springer,2003:201-212. 被引量:1
  • 3OHKUBO M, SUZUKI K, KINOSHITA S.Hash-chain based forward-secure privacy protection scheme for low-cost RFID[C]//Proc of Symposium on Cryptography and Information Security.Berlin:Springer,2004:719-724. 被引量:1
  • 4LEE S M, HWANG Y J, LEE D H.Efficient authentication for low-cost RFID systems[C]//Proc of International Conference on Computational Science and Its Applications.Berlin:Springer,2005:619-627. 被引量:1
  • 5HENRICI D, MAULLER P.Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers[C]//Proc of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops.Los Alamitos:IEEE Computer Society,2004. 被引量:1
  • 6TSUDIK G.YA-TRAP:yet another trivial RFID authentication protocol[C]//Proc of the 4th IEEE International Conference on Pervasive Computing and Communications Workshops.2006:640-643. 被引量:1
  • 7TAN C C, SHENG Bo, LI Qun.Secure and severless RFID authentication and search protocols[C]//Proc of the 5th Annual IEEE International Conference on Pervasive Computing and Communications.New York:IEEE Press,2007:24-29. 被引量:1
  • 8LIN I C, TSAUR S C, CHANG Kai-ping.Lightweight and serverless RFID authentication and search protocol[C]//Proc of the 2nd International Conference on Computer and Electrical Engineering.[S.l.]:IEEE Press,2009:95-99. 被引量:1
  • 9冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 10马昌社.前向隐私安全的低成本RFID认证协议[J].计算机学报,2011,34(8):1387-1398. 被引量:66

二级参考文献105

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3Feldhofer M. Comparison of low-power implementations of Trivium and Grain//Proceedings of the Workshop on the State of the Art of Stream Ciphers (SASC 2007). Bochum, Germany, 2007:236-246. 被引量:1
  • 4Feldhofer M, Wolkerstorfer J. Strong crypto for RFID tags--A comparison of low-power hardware implementations//Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 2007). New Orleans, USA, 2007, 27-30. 被引量:1
  • 5Haitner I, Reingold O, Vadhan S. Efficiency improvements in constructing pseudorandom generator from any one-way function//Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC 2010). Cambridge, USA, 2010: 437-446. 被引量:1
  • 6Juels A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394. 被引量:1
  • 7Juels A, Pappu R, Parno B. Unidirectional key distribution across time and space with applications to RFID security// Proceedings of the 17th USENIX Security Symposium. San Jose, Canada, 2008:75-90. 被引量:1
  • 8Molnar D, Wagner D. Privacy and security in library RFID.. Issues, practices, and arehitectures//Proceedings of the Conference on Computer and Communications Security (ACM CCS'04). Washington, USA, 2004:210-219. 被引量:1
  • 9Li Y, Ding X. Protecting RFID communications in supply chains//Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS' 07). Singapore, Singapore, 2007: 234-241. 被引量:1
  • 10Ma C, Li Y, Deng R, Li T. RFID privacy.. Relation between two notions, minimal condition, and efficient construction// Proceedings of the 16th ACM Conference on Computer and Communications Security (ACM CCS- 09). Chicago, USA, 2009, 54-65. 被引量:1

共引文献199

同被引文献49

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2雷吉成.物联网安全技术[M].北京:电子工业出版社,2012:34-35. 被引量:6
  • 3TAN C C, SHENG B, IA Q. Secure and severless RFID authentication and search protocols[J]. IEEE Transactions on Wireless Communication, 2008,7(4) :1400-1407. 被引量:1
  • 4LIN I C, TSAUR S C, CHANG K P. Lightweight and serverless RFID authentication and search pro- tocol [C]//Proc. of 2nd International Conference on Computer and Electrical Engineering. Dubai: IEEE Press, 2009. 被引量:1
  • 5Tan C C, Sheng B, and Li Q. Secure and severless RFID authen- tication and search protocols[ C ] //Proc of the 5th Annual IEEE International Conference on Pervasive Computing and Communi- cations, New York :IEEE ,2007:24 -29. 被引量:1
  • 6Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, etal. Se- cure tag search in RFID systems using mobile readers [ J ]. IEEE Transactions on Dependable and Secure Computing ,2014, (99) :. 被引量:1
  • 7Juels A,Pappu R. Squealing Euros:Privacy Protection in RFID- Enabled Banknotes [ C ]. Financial Cryptography. Springer Ber- lin Heidelberg,2003 : 103 -121. 被引量:1
  • 8Go|le P, Jakobsson M, Juels A. Syverson universal re-eneryption for mixnets [ C ]//The Cryptographers' Track at the RSA Confe- rence 2004, San Francisco, CA, USA ,2004 : 163 -178. 被引量:1
  • 9Samad Rostampour, Mojtaba Eslamnezhad Namin, Mehdi Hos- seinzadeh. A novel mutual RFID authentication protocol with low complexity and high security[J]. International Journal of Modem Education and Computer Science ( IJMECS ) , 2014,6 ( 1 ) : 17 - 24. 被引量:1
  • 10Hua Man, Li Yanling. Security authentication protocol analysis and security issue of RFID [ C ]Jj2011 2nd International Confe- rence on Management Science and Engineering, MSE 2011, En- gineering Technology ,2011. 被引量:1

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部