期刊文献+

基于Hash锁的同步强化RFID验证协议 被引量:12

Hash Lock-based Strengthen Synchronization RFID Authentication Protocol
在线阅读 下载PDF
导出
摘要 针对基于Hash函数和密钥更新机制的无线射频识别(RFID)安全协议可能导致数据同步,使得标签认证失败的问题,对几种RFID安全协议保护同步的方法进行分析,指出它们的特点和局限,在此基础上提出基于Hash锁的同步强化RFID安全协议。该协议在数据库记录中添加保护数据同步的密钥Kp,解决了数据同步问题。分析结果表明该协议实现了防止信息泄露、不可追踪性和数据同步等要求,且计算复杂度低。 The Radio Frequency Identilfication(RFID) authentication protocol based on Hash lock and key updating may lead to desynchronization which makes the tag-to-render authentication fall into faihure, tn the paper, the anti-desynchronization methods of several RFID authentication protocols are analyzed and the disadvantages of which are also pointed out, and a novel scheme, Hash lock-based strengthen synchronization RFID authentication protocol is proposed. The scheme achie,,es the anti-desynchronization requirement by adding anti-desynchronization Key Kpinto the database. Analysis result shows that the new scheme realizes the requirement of anti-information leakage, intraceability and synchronization with a low computing load.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第21期138-139,143,共3页 Computer Engineering
基金 国家“863”计划基金资助项目“基于ISO18000-6TypeB/C标准的(UHF)标签芯片研发和产业化”(2006AA04A109)
关键词 无线射频识别 隐私安全 同步 Hash锁 Radio Frequency ldentification(RFID) privacy sccurity synchronization Hash lock
作者简介 白煜(1978-),男,博士研究生,主研方向:信号与信息处理,射频识别技术; E-mail:baiyu220853@sina.com 滕建辅,教授、博士生导师; 张立毅,教授、博士生导师; 郭继昌,教授
  • 相关文献

参考文献8

  • 1Juels A. RFID Security and Privacy: A Research Survey[J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2): 381-394.
  • 2Ohkubo M, Suzuki K, Kinoshita S. Cryptographic Approach to "Privacy-friendly" Tags[C]//Proc. of RFID Privacy Workshop. Cambridge, MA, USA: [s. n.], 2003: 77-83.
  • 3Sarma S, Weis S, Engels D. RFID Systems and Security and Privacy Implications[C]//Proc. of Workshop on Cryptographic Hardware and Embedded Systems. [S. l.]: Springer, 2002: 454-469.
  • 4Lee S M, Hwang Y J, Lee D H. Efficient Authentication for Low-cost RFID Systems[C]//Proc. of the International Conference on Computational Science and Its Applications. Berlin, Germany: [s. n.], 2005: 619-627.
  • 5周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:213
  • 6李章林,卢桂章,辛运帏.基于Hash链的可扩展RFID验证协议[J].计算机工程,2008,34(4):173-175. 被引量:7
  • 7Dimitriou T. A Lightweight RFID Protocol to Protect Against Traceability and Cloning attacks[C]//Proe, of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks. Athens, Greece: [s. n.], 2005: 59-66.
  • 8曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34

二级参考文献44

  • 1Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 2Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 3Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 4Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 5Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 6Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 7Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 8Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 9Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
  • 10Saito J,Ryou J.C,Sakurai K..Enhancing privacy of universal re-encryption scheme for RFID tags.In:Yang L.T,Guo M,Gao G.R,Jha N.K.eds..Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2004).Lectures Notes in Computer Science 3207.Berlin:Springer-Verlag,2004,879~890

共引文献237

同被引文献128

引证文献12

二级引证文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部