期刊文献+

一种轻量级的无线射频识别双向认证方案研究

Research on a light-weight RFID mutual-authentication protocol
下载PDF
导出
摘要 针对射频识别系统中存在的安全缺陷问题,文章提出了一种轻量级RFID双向认证协议。与其他此类协议相比,文章中提出的协议能够有效抵抗假冒攻击、去同步化攻击等多种恶意攻击方式,同时具备运算与存储资源少等优点。 Aiming at the security problems of RFID,a light-weight RFID mutual-authentication protocol was proposed in this paper.Compared with other such protocols,the protocol proposed in this paper can effectively resist the malicious attacks such as impersonation attack,desynchronization attack and so on.At the same time,it has the advantages of less computation and storage resources.
作者 张朝晖 简碧园 刘道微 Zhang Zhaohui Jian Biyuan Liu Daowei(Education Examinations Authority of Guangdong Province, Guangzhou 510006, China Information Engineering School of Guangzhou Voctional College of Science and Technology, Guangzhou 510006, China)
出处 《无线互联科技》 2017年第3期30-31,共2页 Wireless Internet Technology
关键词 射频识别 轻量级 双向认证 交叉位运算 循环校验函数 RFID light-weight mutual-authentication crossover operation CRC
  • 相关文献

参考文献4

二级参考文献57

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Feldhofer M. Comparison of low-power implementations of Trivium and Grain//Proceedings of the Workshop on the State of the Art of Stream Ciphers (SASC 2007). Bochum, Germany, 2007:236-246. 被引量:1
  • 3Feldhofer M, Wolkerstorfer J. Strong crypto for RFID tags--A comparison of low-power hardware implementations//Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 2007). New Orleans, USA, 2007, 27-30. 被引量:1
  • 4Haitner I, Reingold O, Vadhan S. Efficiency improvements in constructing pseudorandom generator from any one-way function//Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC 2010). Cambridge, USA, 2010: 437-446. 被引量:1
  • 5Juels A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394. 被引量:1
  • 6Juels A, Pappu R, Parno B. Unidirectional key distribution across time and space with applications to RFID security// Proceedings of the 17th USENIX Security Symposium. San Jose, Canada, 2008:75-90. 被引量:1
  • 7Molnar D, Wagner D. Privacy and security in library RFID.. Issues, practices, and arehitectures//Proceedings of the Conference on Computer and Communications Security (ACM CCS'04). Washington, USA, 2004:210-219. 被引量:1
  • 8Li Y, Ding X. Protecting RFID communications in supply chains//Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS' 07). Singapore, Singapore, 2007: 234-241. 被引量:1
  • 9Ma C, Li Y, Deng R, Li T. RFID privacy.. Relation between two notions, minimal condition, and efficient construction// Proceedings of the 16th ACM Conference on Computer and Communications Security (ACM CCS- 09). Chicago, USA, 2009, 54-65. 被引量:1
  • 10Berbain C, Billet O, Etrog J, Gilbert H. An efficient forward private RFID protocol//Proceedings of the 16th ACM Conference on Computer and Communications Security (ACM CCS'09). Chicago, USA, 2009:43-53. 被引量:1

共引文献134

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部