期刊文献+

改进的RFID群组证明协议 被引量:2

Improved RFID yoking proof protocol
下载PDF
导出
摘要 针对射频识别(RFID)群组证明协议中的安全和隐私问题,重点分析Cho等提出的一种RFID群组证明协议中存在的交错攻击问题,在此基础上,提出一种改进的RFID群组证明协议。利用消息认证码和伪随机数生成器等加密技术,以及计算结构上的不对称性,保障协议的安全和隐私。安全分析结果表明,该协议与其它相关协议相比具有更强的安全性和更好的隐私保护。将该协议扩展为相对应的针对多个RFID标签的群组证明协议。 Aiming at the issues of security and privacy for RFID grouping proof protocol, the existing issue of interleaving attack of a kind of RFID yoking proof protocol proposed by Cho et al was analyzed emphatically. On this basis, an improved RFID yoking proof protocol was proposed. Encryption technologies were used such as message authentication code and pseudo random number generator, and asymmetry of calculating structure was adopted, to protect the security and privacy of the protocol. The analysis of security shows that the proposed protocol possesses better security performances and privacy protection. The proposed protocol was expanded into the corresponding grouping proof protocol for multiple RFID tags.
作者 孙达志 朱泽光 SUN Da-zhi ZHU Ze-guang(School of Computer Science and Technology, Tianjin University, Tianjin 300350, China State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China)
出处 《计算机工程与设计》 北大核心 2017年第8期2076-2080,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(61003306) 可信计算上海重点实验室开放基金项目(07dz22304201402)
关键词 射频识别(RFID) 群组证明 认证 安全 隐私 交错攻击 RFID yoking proof authentication security privacy interleaving attack
  • 相关文献

参考文献3

二级参考文献40

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Pappu R, Recht B, Taylor J, et al. Physical One-way Functions[J]. Science, 2002, 297(5589): 2026-2030. 被引量:1
  • 3Riihrmair U, Sehnke F, S6lter J, et al. Modeling Attacks on Physical Unclonable Functions[C]//Proc. of the 17th ACM Conference on Computer and Communications Security. Chicago, Illinois, USA: ACM Press, 2010. 被引量:1
  • 4Kulseng L, Yu Zhen, Wei Yawen, et al. Lightweight Mutual Authentication and Ownership Transfer for RFID Systems[C]// Proc. of INFOCOM'10. [S. 1.]: IEEE Press, 2010. 被引量:1
  • 5Ranasinghe D, Engels D, Cole P. Security and Privacy: Modest Proposals for Low-cost RFID Systems[C]//Proc. of Intelligent Sensors, Sensor Networks and Information Processing Conference. [S. 1.]: IEEE Press, 2004. 被引量:1
  • 6Tuyls P, Batina L. RFID-tags for Anti-counterfeiting[C]//Proc. of CT-RSA'06. San Jose, USA: [s. n.], 2006. 被引量:1
  • 7Bolotnyy L, Robins G. Physically Unclonable Function-based Security and Privacy in RFID Systems[C]//Proc. of the 5th AnnualIEEE International Conference on Pervasive Computing and Communications. [S. 1.]: IEEE Press, 2007. 被引量:1
  • 8Oztiirk E, Hammouri G, Sunar B. Towards Robust Low Cost Authentication for Pervasive Devices[C]//Proc. of the 6th Annual IEEE International Conference on Pervasive Computing and Communications. [S. 1.]: IEEE Press, 2008. 被引量:1
  • 9Cortese P F, Gemmiti F, Palazzi B, et al. Efficient and Practical Authentication of PUF-based RFID Tags in Supply Chains[C]// Proc. of IEEE International Conference on RFID Technology and Applications. [S. 1.]: IEEE Press, 2010. 被引量:1
  • 10Choi W, Kim S, Kim Y, et al. PUF-based Encryption Processor for the RFID Systems[C]//Proc. of the 10th International Conference on Computer and Information Technology. [S. 1.]: IEEE Press, 2010. 被引量:1

共引文献2

同被引文献13

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部