期刊文献+

基于EPC-C1G2标准的高效RFID安全认证协议 被引量:3

High-efficient and Security RFID Authentication Protocol Based on EPC-C1G2 Standard
下载PDF
导出
摘要 在EPC-C1G2标准下针对现有RFID协议中认证效率低、标签与后台数据库间更新不同步问题,提出一种高效RFID安全认证协议。通过随机抽取ID中部分数据,有效降低标签计算量,要求阅读器缓存标签临时ID,解决动态ID机制中标签和数据库同步更新。利用BAN逻辑形式化推理方法,证明协议的安全性和正确性。实验结果显示,协议安全性好,认证效率显著提高,实用性强。 In order to overcome the low efficiency of authentication and resynchronization between tags anddatabase of the existing EPC-C 1G2 authentication protocol, an efficiency and security RFID authenticationprotocol is proposed. The proposed protocol can reduce the tag computation by selecting partials of tag IDrandomly. And it can deal with the synchronization of data update by the cache of the reader which containstemporary ID. The formal proof of correctness and security of the proposed protocol is given by using BANlogic, Experimental results show that the proposed protocol has good security and strong efficiency, whichmake it more practical.
作者 邓春红
出处 《控制工程》 CSCD 北大核心 2017年第1期141-147,共7页 Control Engineering of China
基金 安徽省自然科学基金资助项目(1408085MF124) 安徽省省级物联网技术实践基地项目(2013sjjd070) 安徽省高校学科拔尖人才学术资助重点项目(gxbj ZD2016098)
关键词 EPC-C1G2 RFID 安全认证协议 同步更新 高效性 安全性 EPC-CIG2 RFID security authentication protocol synchronous update efficiency security
  • 相关文献

参考文献5

二级参考文献120

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2曹小丽,孔松涛,张长新.基于RFID技术的邮政车辆管理系统[J].计算机应用,2007,27(B06):119-120. 被引量:4
  • 3International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004 被引量:1
  • 4Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248 被引量:1
  • 5Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643 被引量:1
  • 6Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44 被引量:1
  • 7Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001 被引量:1
  • 8Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84 被引量:1
  • 9Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003 被引量:1
  • 10Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140 被引量:1

共引文献208

同被引文献23

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部