期刊文献+

基于Hash链的RFID认证协议 被引量:7

RFID authentication protocol based on Hash chain
在线阅读 下载PDF
导出
摘要 为了提高大规模RFID系统的认证效率,通过分析现有RFID系统的认证效率和安全性,提出了一套基于Hash函数的改进协议。向RFID读写器加入过滤规则,能够有效过滤恶意和无效的认证请求;对标签的访问计数器值的分层化、更新和重置,可以有效提高后端数据库检索数据的命中率。通过分析和测试,该协议能够有效抵御假冒攻击、重传攻击等不安全问题,有效提高RFID认证的效率,降低认证服务器计算负荷。 In order to improve the certification efficiency of large-scale RFID system, a set of improved protocols based on Hash function are proposed by analyzing the certification efficiency and safety of existing RFID systems. Joining the filtering rules into RFID reader can effectively filter malicious and invalid authentication request. The stratification, updating and resetting of tag access counter's value can effectively improve the hit rate of the retrieving data in back-end database. The analysis and testing results show that the protocols can effectively resist the fake attack, replay attack and other unsafe problems. In addition, the protocols can improve the efficiency of RFID authentication and reduce the computational load of authentication server effectively.
出处 《微型机与应用》 2016年第19期60-63,共4页 Microcomputer & Its Applications
关键词 RFID 认证协议 访问计数器 HASH 读写器 RFID authentication protocol access counter Hash reader
  • 相关文献

参考文献5

二级参考文献92

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:104
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 4Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 5Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 6Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 7Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 8Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 9Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 10Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140

共引文献299

同被引文献32

引证文献7

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部