浅谈基于哈希函数的RFID身份认证协议
Discussion of RFID identity authentication protocol based on hash function
摘要
对基于哈希函数的RFID身份认证协议进行了简要的介绍,对多个协议的安全性能进行了详细的分析和比较,指出其存在的安全缺陷,并提出相应的改进思路。
出处
《电子产品世界》
2016年第1期30-32,共3页
Electronic Engineering & Product World
基金
海南省自然科学基金(20156250
614231)
参考文献7
-
1SARMA S E, WEIS S A, ENGELS D W RFID systems and security and privacy impficatJons[C].llProceedings of the 4th international Workshop on CryptographJc Hardware and Embedded Systems, New York: Springer-Verlag, 2002:454-469. 被引量:1
-
2WEIS S A, SARMA S E, RIVEST R L, et aL Security and privacy aspecls of ow-cost radio frequency identification systems[J]. Security in Pervasive Computing, 2004, 28(2):201-212. 被引量:1
-
3OHKUBO M, SUZUKI K, KINOSHITA S, Hash-chain based forward-secure privacy protection scheme for low-cost RFID[C].//Proceedings of 2004 Symposium on Cryptography and Information Secudty(SCIS 2004), Berlin: Springer-Verlag, 2004:719-724. 被引量:1
-
4SHEN J, CHOI D, MOH S, et al. A novel anonymous RFID authentication protocol providing strong privacy and security[C]ll Proceedings of 2010 International Conference on Multimedia Information Networking and Secunty, Nanfing: ACM Press, 2010:584-588. 被引量:1
-
5陆桑璐,谢磊编著..射频识别技术 原理、协议及系统设计[M].北京:科学出版社,2014:289.
-
6田芸,陈恭亮,李建华.针对RFID身份认证协议——ARAP协议的攻击及改进[J].中国电子科学研究院学报,2011,6(6):556-560. 被引量:6
-
7李景峰,郭卫锋.对ARAP认证协议的攻击及其改进[J].武汉大学学报(理学版),2012,58(6):526-530. 被引量:3
二级参考文献15
-
1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
-
2JUELS A. RFID Security and Privacy: A Research Sur- vey [J]. IEEE Journal on Selected Areas in Communica- tions, 2006, 24(2): 381-394. 被引量:1
-
3WEISS A, SARMA S E, RIVEST R L, ENGELS D W. Security and Privacy Aspects of Low-Cost Radio Frequen- cy Identification Systems [ C ]. First International Confer- ence on Security in Pervasive Computing,2003:201-212. 被引量:1
-
4SHEN J, CHOI D, MOH S, CHUNG I. A Novel Anony- mous RFID Authentication Protocol Providing Strong Pri- vacy and Security [ C ]. 2010 International Conference on Multimedia Information Networking and Security, 2010: 584-588. 被引量:1
-
5KARTHIKEYAN S, NESTERENKO M. RFID Security with- out Extensive Cryptography [ C ]. The Third ACM Work- shop Security of Ad Hoc and Sensor Networks, 2005 : 63- 67. 被引量:1
-
6SUN H M, TING W C, WANG K H. On the Security of Chien' s Ultralightweight RFID Authentication Protocol [J]. IEEE Transactions on Dependable and Secure Com- puting, 2011, 8(2): 315-317. 被引量:1
-
7Sarma S E,Weis S A,Engels D W. RFID systems and security and privacy implications[C]//Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, New York:Springer-Verlag, 2002 : 454-469. 被引量:1
-
8Weis S A,Sarma S E,Rivest R L,et al. Security and privacy aspects of low-cost radio frequency identification systems[J]. Security in Pervasive Computing, 2004,28(2) :201-212. 被引量:1
-
9Ohkubo M, Suzuki K, Kinoshita S. Hash-chain based forward secure privacy protection scheme for low-cost RFID[C]//Proceedings of the 2004 Symposium on Cryptography and Information Security, Berlin: Springer-Verlag, 2004 : 719-724. 被引量:1
-
10Shen J, Choi D, Moh S, et al. A novel anonymous RFID authentication protocol providing strong privacy and security[C]//Proceedings of 2010 International Conference on Multimedia Information Networking and Security, Nanjing: ACM Press, 2010 : 584-588. 被引量:1
共引文献5
-
1王民川,管磊.面向RFID系统的SQL注入攻击检测和防御算法[J].电子技术应用,2015,41(10):111-114.
-
2丁洁,吴汉炜,林志阳,王泽众.增强型匿名RFID双向认证协议eARAP的设计与分析[J].广西大学学报(自然科学版),2015,40(6):1494-1500. 被引量:1
-
3张玉婷,严承华.一种基于双向认证协议的RFID标签认证技术研究[J].信息网络安全,2016(1):64-69. 被引量:12
-
4陈庄,陈亚茹.基于hash实现低成本RFID的SRFID安全方案[J].重庆理工大学学报(自然科学),2017,31(12):140-145. 被引量:4
-
5丁洁,张永辉,任佳,王泽众.对ARAP协议的分析与改进[J].现代电子技术,2016,39(16):68-70.
-
1洪胜华,薛之昕,伍军云,白小明.移动用户身份认证技术[J].科技广场,2004(9):51-53.
-
2裴继奎,李大兴.X.509中身份认证协议的安全性描述[J].计算机应用,2001,21(10):64-66. 被引量:4
-
3汪波.TCP/IP协议的安全性[J].电脑技术信息,2000(8):15-16.
-
4安全性成手机支付最大问题[J].销售与管理,2011(1):51-51.
-
5杨君,刘云,吴海旺.无线射频识别技术及应用[J].现代通信,2003(6):13-16. 被引量:18
-
6蔡昱菁.浅谈4G移动通信技术与安全缺陷[J].通讯世界(下半月),2015(8):30-30. 被引量:3
-
7土屋贵纪.无线射频识别技术RFID在物联网的应用[J].集成电路应用,2015,0(1):35-37. 被引量:2
-
8唐晓辉,嵇建波,吴慧峰.浅谈物联网技术与应用[J].广西通信技术,2011(2):45-47. 被引量:3
-
9梁文娟.在电力通信网中OTN技术的应用[J].数字技术与应用,2015,33(9):26-26. 被引量:3
-
10朱利娟.基于认证码的密钥分配协议研究[J].信息技术,2010,34(1):73-74.