期刊文献+

EPC网络中一种可证明安全的跨域认证协议 被引量:4

Provably Secure Cross-realm Authentication Protocol in EPC Network
在线阅读 下载PDF
导出
摘要 EPC信息服务是EPCglobal框架提供电子产品码信息管理的核心组件,储存着电子产品码对应的信息,是实现企业间信息共享的关键.提出一种EPC网络中的跨域认证协议,利用数字签名和消息认证码等技术,实现用户和EPC信息服务之间的双向认证和密钥协商,防止未授权用户查询EPC信息服务以及伪造的EPC信息服务向用户提供虚假信息.利用Canetti-Krawc-zyk模型对协议的安全性进行了详细的分析,分析表明该协议是可证明安全的.同时,性能对比分析表明该协议具有较低的通信开销和计算量. EPC Information Service is a core component of EPCglobal framework, provides the management of electronic product code and storage of the information corresponding to the electronic product code. Inducing the digital signature and the message authentication code, a cross-realm protocol in EPC network is proposed, which can implement mutual authentication and secure key agreement between the EPC Information Service and client. Security analysis shows that the protocol is provably secure in the Canetti-Krawczyk model. Furthermore, the protocol has efficient computation and communication cost.
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第5期983-986,共4页 Journal of Chinese Computer Systems
基金 河南省科技攻关重点项目(092101210504)资助 郑州市科技攻关项目(10PTGG340-4)资助
关键词 EPC网络 射频识别 身份认证 跨域 Canetti—Krawczyk模型 EPC network RFID authentication cross-realm Canetti-Krawczyk model
  • 相关文献

参考文献17

  • 1EPCglobal. The EPCglobal architecture framework version 1. 4[EB/OL]. http://www.gs1. orgl gsmp/kcl epcglobal/ architec-ture/architecture_13-framework-20101215. pdf, December 2010.
  • 2EPCglobal. EPC information services (EPCIS) version 1. O. 1 [EB/OL]. http://www.gs1. orgl gsmp/kcl epcglobaVepcisl ep-cis_l_0_l-standard-20070921. pdf, September 2007.
  • 3Benjamin Fabian, Oliver Giinther. Security challenges of the EPCglo-bal network[J]. Communications of the ACM ,2OOJ ,52(7) :121-125.
  • 4Kerschbaum F, Chaves L W F. Secure sharing of item-level data in the cloud[C]. In: Proceedings of Cloud Computing Proceedings, Washington, DC, 2011: 756-757.
  • 5Florian Kerschbaum. An access control model for mobile physical objects[C]. In: Proceedings of ACM Symposium on Access Con-trol Models and Technogies, Pitts Burgh, Pennsylvania, USA,June 9-11 , 2010: 193-202.
  • 6Rolf H Weber. Internet of things-new security and privacy challen-ges] J]. Computer Law & Security Review ,2010 ,26( I) :23-30.
  • 7Kyuhee An, Kiyeal Lee, Mokdong Chung. Design and implemen-tation of an RFID-based enterprise application framework based on abstract BP and kerberos[J]. InternationalJournal of Information Processing Systems, 2006, 2 ( 3 ) : 170-177.
  • 8WenJun, Tian Wen-hong, Wang Wei-dong. An authentication ap-proach to euhance RFID security[C] . In : Proceedings of Communica-tion,Circuits and Systems Proceedings ,Chengdu ,China ,2010: 144-146.
  • 9LiJun, WenJun. Security improvement in RFID supply chain[C]. In: Proceedings of Internet Technology and Application, Chengdu, China, 2011: 14.
  • 10Dae-Jung Kim,Jeong-Jai Kim, Seung-Min Lee, et al. Design and implementation for EPC system method to authentication and cryp-tography[C]. In: Proceedings of Information Security and Assur-ance, Busan, 2008: 137-141.

二级参考文献36

  • 1彭双和,韩臻,沈昌祥.安全域间信息资源访问的协议和方法[J].计算机研究与发展,2005,42(9):1587-1593. 被引量:7
  • 2陈炜,龙翔,高小鹏.一种用于移动IPv6的混合认证方法[J].软件学报,2005,16(9):1617-1624. 被引量:12
  • 3彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 4冯登国,陈伟东.基于口令的安全协议的模块化设计与分析[J].中国科学(E辑),2007,37(2):223-237. 被引量:14
  • 5NASSER N, HASSWA A, HASSANEIN H. Haadoffs in fourth gen ration heterogeneous networks[J]. IEEE Commtm Mag, 2006, 44(10):96-103.
  • 6MISHRA A, SHIN M, ARBAUGH W. An empirical analysis of the IEEE 802.11 MAC layer handoff process[J]. ACM SIGCOMM Computer Communications Review, 2003, 33(2): 93-102.
  • 7IEEE 802.21 Standard Media Independent Handover Services[S]. 2009.
  • 8OHBA Y. Five criteria for security extensions to media independent handover services[EBOL], http://www.ieee802.org/21/802 21a_5C. pdf, 2010.
  • 9MUSSABBIR Q B, YAO W, NIU Z, et al. Optimized FMIPv6 using IEEE802.21 MIH services in vehicular networks[J]. IEEE Transactions on Vehicular Technology, 2007, 56(6): 3397-3407.
  • 10EASTWOOD L, MIGALDI S, XIAO Q B, et al. Mobility using IEEE 802.21 in a heterogeneous IEEE 802.16/802.11-based IMT-ADVANCED (4G) network[J]. IEEE Wireless Communications, 2008, 15(2): 26-34.

共引文献58

同被引文献15

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部