共查询到19条相似文献,搜索用时 93 毫秒
1.
2.
3.
4.
5.
6.
奚忠方 《信息安全与通信保密》2014,(11):69-70
目前国外新型汽车的控制系统和电子零部件,对功能安全和信息安全防护措施,在汽车控制系统及硬件和软件设计时,已朝着"专用芯片"方向发展。我国的设计和研发尚在起步阶段,尚未形成"专用芯片"级的氛围和趋势。在不同的汽车总线和通讯系统中,以及汽车的控制系统和电子零部件产品中,为了汽车控制系统和数据信息安全的需要,引入不同的信息安全防护措施,这不仅能保护各主机厂和各零部件供应商的知识产权和软件著作权。 相似文献
7.
《现代电子技术》2014,(9)
我国的UHF RFID使用的800/900 MHz频段距离移动通信CDMA800、GSM等频段较近,易受到移动通信系统的干扰,导致RFID标签的解调误码率增加。在分析干扰形成机理的基础上,通过对UHF频段频率分布的分析,提出了抗移动通信终端干扰的UHF RFID标签天线设计方法,推导出介质基板厚度h计算公式。将该方法应用到IT设备资产进行管理的RFID标签天线设计上,仿真结果表明,RFID频段的回波损耗S11值均小于-10 dB,CDMA800、GSM等频段的回波损耗S11均大于-10 dB,RFID频段的电压驻波比VSWR值均小于2,移动通信频段的电压驻波比VSWR值均大于2,获得了良好的抗移动通信终端干扰的性能。 相似文献
8.
UHF频段卫星道信的现状与未来发展 总被引:1,自引:0,他引:1
简述了特高频频段(UHF)应用于卫星通信(SATCOM)的优点及作用;介绍了当前广泛应用于美国陆海空三军和各政府机构中的UHF卫星通信系统——特高频后续(UFO)卫星系统;陈述了美军下一代UHF卫星通信系统——移动用户目标系统(MUOS)及其关键技术;提出了一种提高UHF卫星通信系统容量的新方案。 相似文献
9.
10.
11.
12.
RFID系统中有限的标签芯片资源,导致数据与信息的安全成为RFID系统的重要问题之一,散列函数的单向性为RFID的识别和认证提供了一种既可靠又有效的途径.在分析了现有几种典型散列认证协议的基础上,提出了一种新的基于散列函数的安全认证协议.本协议旨在解决手持式、无线连接的RFID阅读器与标签、服务器间的识别,利用散列函数实现服务器、阅读器以及电子标签三者之间的相互认证.经过安全性与性能的分析,新协议在采用较小的存储空间和较低的运算开销的情况下,可抵抗已知的大多数攻击,有效地保证了RFID系统中数据和隐私的安全,实现了终端与服务器间的双向认证和匿名认证,非常适合于在大型分布式系统中使用. 相似文献
13.
Atakan Arslan Süleyman Kardaş Sultan Aldırmaz Çolak Sarp Ertürk 《Wireless Personal Communications》2018,100(4):1355-1375
Security and privacy concerns have been growing with the increased utilisation of RFID technology in our daily lives. To mitigate these issues, numerous privacy-friendly authentication protocols have been published in the last decade. Random number generators (RNGs) are necessarily used in RFID tags to provide security and privacy. However, low-end RNGs can be the weakest point in a protocol scheme and using them might undesirably cause severe security and privacy problems. On the other hand, having a secure RNG with large entropy might be a trade-off between security and cost for low-cost RFID tags. Furthermore, RNGs used in low-cost RFID tags might not work properly in time. Therefore, we claim that the vulnerability of using an RNG deeply influences the security and privacy level of the RFID system. To the best of our knowledge, this concern has not been considered in the RFID literature. Motivated by this need, in this study, we first revisit Vaudenay’s privacy model which combines the early models and presents a new mature privacy model with different adversary classes. Then, we extend the model by introducing RANDOMEYE privacy, which allows analyzing the security of RNGs in RFID protocols. We further apply our extended model to two existing RFID schemes. 相似文献
14.
In this paper we propose a novel approach to authentication and privacy in mobile RFID systems based on quadratic residues and in conformance to EPC Class-1 Gen-2 specifications. Recently, Chen et al. (2008) [10] and Yeh et al. (2011) [11] have both proposed authentication schemes for RFID systems based on quadratic residues. However, these schemes are not suitable for implementation on low-cost passive RFID tags as they require the implementation of hash functions on the tags. Consequently, both of these current methods do not conform to the EPC Class-1 Gen-2 standard for passive RFID tags which from a security perspective requires tags to only implement cyclic redundancy checks (CRC) and pseudo-random number generators (PRNG) leaving about 2.5k–5k gates available for any other security operations. Further, due to secure channel assumptions both schemes are not suited for mobile/wireless reader applications. We present the collaborative authentication scheme suitable for mobile/wireless reader RFID systems where the security of the server–reader channel cannot be guaranteed. Our schemes achieves authentication of the tag, reader and back-end server in the RFID system and protects the privacy of the communication without the need for tags to implement expensive hash functions. Our scheme is the first quadratic residues based scheme to achieve compliance to EPC Class-1 Gen-2 specifications. Through detailed security analysis we show that the collaborative authentication scheme achieves the required security properties of tag anonymity, reader anonymity, reader privacy, tag untraceability and forward secrecy. In addition, it is resistant to replay, impersonation and desynchronisation attacks. We also show through strand space analysis that the proposed approach achieves the required properties of agreement, originality and secrecy between the tag and the server. 相似文献
15.
为了减少单位管理成本,提高车辆的使用效率。基于RFID技术建立的车辆管理系统,通过RFID电子标签和车辆定位系统相结合,及时获取单位多拥有车辆的实时状况,尽量杜绝单位公车私用的状况。通过实践证明,利用RFID技术开发的车辆管理系统界面友好,操作简便,实现了操作目标。 相似文献
16.
RFID技术应用越来越广,给人们带来便利的同时安全和隐私问题也相随而生,如何提高RFID系统的安全防范能力已成为该领域的重点研究方向。许多研究者提出了基于RFID空中接口通信的认证协议,但复杂的算法难以适用于符合ISO18000-6C标准的电子标签。论文根据ISO18000-6C标准提出了一种新的适合低成本标签的认证协议,为RFID安全提供了一套解决方案。 相似文献
17.
Nowadays, traceability represents a key activity in many sectors. Many modern traceability systems are based on radio‐frequency identification (RFID) technology. However, the distributed information stored on RFID tags involves new security problems. This paper presents the traceability multi‐entity cryptography, a high‐level data protection scheme based on public key cryptography that is able to protect RFID data for traceability and chain activities. This scheme is able to manage entities with different permissions, and it is especially suitable for applications that require complex Information Systems. Traceability multi‐entity cryptography avoids industrial espionage, guarantees the information authenticity, protects the customer privacy, and detects malicious alterations of the information. In contrast to the state‐of‐the‐art RFID security schemes, the proposed protocol is applicable to standard RFID tags without any cryptographic capability, and it does not require a central database. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献
18.
一种具有阅读器匿名功能的射频识别认证协议 总被引:1,自引:0,他引:1
在射频识别(RFID)的应用中,安全问题特别是用户隐私问题正日益凸显。因此,(用户)标签信息的隐私保护的需求越来越迫切。在RFID系统中,标签的隐私保护不仅是对外部攻击者,也应该包括阅读器。而现有许多文献提出的认证协议的安全仅针对外部攻击者,甚至在外部攻击者的不同攻击方法下也并不能完全保证安全。该文提出两个标签对阅读器匿名的认证协议:列表式RFID认证协议和密钥更新式RFID认证协议。这两个协议保证了阅读器对标签认证时,标签的信息不仅对外部攻击者是安全的而且对阅读器也保持匿名和不可追踪。相较于Armknecht等人提出的对阅读器匿名和不可追踪的认证协议,该文所提的协议不再需要增加第三方帮助来完成认证。并且密钥更新式RFID匿名认证协议还保证了撤销后的标签对阅读器也是匿名性和不可追踪的。 相似文献
19.
RFID标签存在着处理能力弱、存储空间小和电源供给有限等局限性,传统的公钥算法或散列函数等复杂运算不能满足实际应用的需求。针对现有轻量级RFID认证协议的不足,设计了基于广义逆矩阵的RFID安全认证协议LAP。该协议采用了硬件复杂度较低的CRC校验及计算量较小的矩阵运算。通过安全隐私和性能分析,LAP协议适用于低成本、存储与计算受限的RFID标签。 相似文献