首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 968 毫秒
1.
基于数字签名的轻量级RFID认证协议   总被引:1,自引:0,他引:1  
RFID系统的安全和隐私问题已成为阻碍其进一步扩展的瓶颈。针对低代价标签提出了一种基于签名方案的轻量级RFID认证协议,它利用数字签名技术和RFID认证技术的恰当结合,成功实现了RFID系统的轻量级认证机制。性能评估表明新协议除了具有主要的安全隐私性能属性之外,还能够抵抗多种典型的恶意攻击和威胁,其安全性依赖于在有限域上求解离散对数问题的困难性和伪随机数生成器的安全性。新协议将公钥密码技术中代价较高的运算置于服务器端,确保了标签端运算的轻量性,促进了公钥密码技术在RFID系统中的进一步实施。  相似文献   

2.
基于密钥矩阵的RFID安全协议   总被引:4,自引:3,他引:1       下载免费PDF全文
裴友林  杨善林 《计算机工程》2008,34(19):170-173
无线射频识别(RFID)作为一种新型的自动识别技术正逐渐得到广泛应用,但RFID系统的特点和RFID设备的局限性带来了很多安全隐患问题。针对这些问题,讨论并阐明RFID的系统组成和安全隐患,分析了几种现有的典型的RFID 安全协议的特点和缺陷,提出一种基于密钥矩阵的RFID安全协议。该协议使用密钥矩阵来加密标签和阅读器之间传输的数据,并在认证后更新标签中密值,能有效抵抗多种攻击。分析表明,该协议具有效率高、成本低、安全性高等特点。  相似文献   

3.
Radio frequency identification (RFID) technology has recently aroused great interest due to its convenience and economic efficiency. Through RFID become popular worldwide, it is susceptible to various attacks and security problems. Since RFID systems use wireless transmission, user privacy may be compromised by malicious people intercepting the information contained in the RFID tags. Many of the methods previously proposed to prevent such attacks do not adequately protect privacy or reduce database loading. In this paper, we propose a new authentication and encryption method that conforms to the EPC Class 1 Generation 2 standards to ensure RFID security between tags and readers. Our scheme not only reduces database loading, but also ensures user privacy. Finally, we survey our scheme from several security viewpoints, and prove its feasibility for use in several applications.  相似文献   

4.
Radio frequency identification (RFID) technology has been widely used in ubiquitous infrastructures. However, resource constraint in the low-cost RFID systems has posed potential risks such as privacy and security problems, becoming adoption barrier for RFID-based applications. In this paper, current security issues in RFID are introduced firstly. Then, we propose a lightweight Anti-desynchronization privacy preserving RFID authentication protocol. It is particularly suitable for the low-cost RFID environment for only the capacity of one-way hash function and XOR operation is needed. In this lightweight Anti-desynchronization RFID authentication protocol, the back-end server keeps the history of the random key update to prevent the active attackers from de-synchronizing the shared secret between the tag and the back-end server. The security and the performance of the proposed protocol are analyzed as well.  相似文献   

5.
RFID安全协议的设计与分析   总被引:74,自引:1,他引:74  
回顾了已有的各种RFID安全机制,重点介绍基于密码技术的RFID安全协议;分析了这些协议的缺陷;讨论了基于可证明安全性理论来设计和分析RFID安全协议的模型和方法.  相似文献   

6.
射频识别(RFID)系统安全对策技术研究的概述   总被引:3,自引:0,他引:3  
如同许多技术一样,随着射频识别技术的不断发展,射频识别系统也将遍布于我们日常生活的每个角落。射频识别系统在带给我们巨大的生产效益和可观的商业价值的同时也威胁到个人和组织的安全和隐私。在简要介绍了射频识别系统所面临的安全和隐私威胁的主要形式后;并针对射频识别系统的安全对策进行了以理论分析,特别是较详细地说明如何利用了密码学方面的相关知识来解决射频识别系统的安全问题。  相似文献   

7.
随着RFID技术的不断发展,其在物流管理,货物监控,会议安全保障等领域的应用越来越广泛,但随之而来的安全威胁是我们不得不考虑的隐患因素。在无线通信技术中,空中接口定义了终端设备与网络设备之间的电磁连接技术规范。目前大部分RFID设备采用公开的标准通信协议进行数据传输,使得RFID系统容易遭到恶意设备的空口入侵,从而导致RFID系统面临严重的安全威胁与数据隐私保护问题。本研究基于恶意读写器的实时发现,完成空口入侵的检测,避免空口数据遭到窃取,保证数据传输安全。本文主要利用无源感知技术对RFID信号无线信道状态信息进行分析与计算,综合运用接收信号强度、相位、吞吐量等信息,提取并建立可以描述无线信道状态信息的参数。利用提取的参数建立基于有限状态机的RFID信号感知数据推断模型,结合自适应算法得出稳态作为依据,分析判断RFID信号的具体变化,实现基于恶意读写器的RFID空口入侵检测。  相似文献   

8.
李斌  凌力 《计算机应用与软件》2012,29(4):278-280,288
随着RFID(Radio Frequency Identification)技术研究进展,RFID系统的应用日趋广泛,从而使得RFID系统本身固有限制所导致的一些问题变得突出和严重,其中就包括RFID的安全、隐私问题.所以基于RFID系统的发展和应用考虑,RFID系统必须满足一定的安全需求.在NTRU(Number Theory Research Unit)公钥加密系统的基础上,提出一种新的RFID安全认证协议,并且结合NTRU公钥加密系统的安全性和通用可组合模型,对新协议的安全性进行了系统、形式化的描述和分析.  相似文献   

9.
随着射频识别(Radio Frequency Identification,RFID)技术的广泛应用,它的信息安全问题被人们越来越重视.而研究安全的最佳方式就是知道如何攻击,因此如今很多黑客在安全部门和电信公司工作.本文研究了RFID安全的主要威胁.首先,明确了信息和位置隐私的重要性.其次,详细描述了RFID系统几种常见攻击手段和解决方案.最后,指出RFID今后的安全研究热点.  相似文献   

10.
In many real world applications, there is a need to search for RFID tagged items. In this paper, we propose a set of protocols for secure and private search for tags based on their identities or certain criteria they must satisfy. When RFID enabled systems become pervasive in our life, tag search becomes crucial. Surprisingly, the problem of RFID search has not been widely addressed in the literature. We analyzed the privacy and security features of the proposed tag search protocols, and concluded that our protocols provide tag identity privacy, tag source location privacy, and tag-reader communication privacy. For the first time, we propose a formal method to securely search RFID tags which satisfy certain search criteria.  相似文献   

11.
基于Hash链的RFID隐私增强标签研究   总被引:4,自引:0,他引:4  
粟伟  崔喆  王晓京 《计算机应用》2006,26(10):2328-2331
无线射频识别(RFID)作为一种新型的自动识别技术在供应链与零售业中得到了广泛的应用。然而由于RFID标签强大的追踪能力,RFID的广泛应用也势必给消费者带来新的隐私威胁问题。在构造RFID方案时有几个技术关键点,尤其重要的是消费者隐私与标签信息的安全问题。低成本是另外一个关键。针对这些问题,讨论并阐明了RFID系统的需求与限制,分析了现有的一些相关的RFID方案的特性与问题。最后提出了一种简单的采用低成本的Hash链机制的安全模式标签来增强消费者隐私。  相似文献   

12.
RFID系统中安全和隐私问题的研究   总被引:7,自引:1,他引:6  
射频识别(RFID)技术的应用将给零售、物流等产业带来革命性的变化,但同时出现的安全和隐私问题却极大地限制了其使用的范围,如何在RFID系统中保证安全、维护个人隐私成为业界讨论的热点问题。在分析四种常见解决方案的基础上,阐明了各自的优缺点,探讨了在RFID系统中解决安全和隐私问题所面临的挑战,并指出了其发展的方向。  相似文献   

13.
The privacy problem of many RFID systems has been extensively studied. Yet integrity in RFID has not received much attention as regular computer systems. When we evaluate an identification protocol for an RFID system for anti-counterfeiting, it is important to consider integrity issues. Moreover, many RFID systems are accessed by multiple level trust parties, which makes comprehensive integrity protection even harder. In this paper, we first propose an integrity model for RFID protocols. Then we use the model to analyze the integrity problems in Squealing Euros protocol. Squealing Euros was proposed by Juels and Pappu for RFID enabled banknotes that will support anti-forgery and lawful tracing yet preserve individual's privacy. We analyze its integrity, we then discuss the problems that arise and propose some solutions to these problems. Then an improved protocol with integrity protection for the law enforcement is constructed, which includes an unforgeable binding between the banknote serial number and the RF ciphertext only readable to law enforcement. This same protocol can be applied in many other applications which require a privacy protecting anti-counterfeiting mechanism.  相似文献   

14.
In this paper we present a novel approach to authentication and privacy in RFID systems based on the minimum disclosure property and in conformance to EPC Class-1 Gen-2 specifications. We present two security schemes that are suitable for both fixed reader and mobile/wireless reader environments, the mutual authentication and the collaborative authentication schemes respectively. Both schemes are suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as only the cyclic redundancy check (CRC) and pseudo random number generator (PRNG) functions that passive RFID tags are capable of are used. Detailed security analysis of both our schemes show that they offer robust security properties in terms of tag anonymity, tag untraceability and reader privacy while at the same time being robust to replay, tag impersonation and desynchronisation attacks. Simulations results are also presented to study the scalability of the schemes and its impact on authentication delay. In addition, Yeh et al. (2010) [20] proposed a security scheme for EPC Class-1 Gen-2 based mobile/wireless RFID systems. We show that this scheme has a security vulnerability and is not suitable for mobile/wireless RFID systems.  相似文献   

15.
随着物联网事业的飞速发展,RFID技术做为物联网最底层的感知技术也得到飞速的发展。但是由于RFID系统开放式的应用环境以及设备的特殊性和局限性,使得RFID系统面临许多隐私安全问题。对RFID系统进行概述,并且对现有的RFID安全协议和安全模型进行综述和评价,并给出RFID系统隐私保护今后的研究方向。  相似文献   

16.
射频识别(RFID)系统利用无线射频技术以非接触的形式,在开放的环境下通过电磁波进行对象识别。但由于RFID系统的特殊性和实际要求的一些局限性,给射频识别带来了很多安全问题。如何设计出适合于RFID系统的高效、安全的认证协议是RFID系统能够进一步广泛应用的关键。本文通过分析现有的典型的RFID安全协议,在了解它们的特点和缺陷的基础上,提出了一种RFID动态协议。通过相关协议的比较表明,该协议是一种安全、高效、隐私性好的认证协议。  相似文献   

17.
RFID (Radio Frequency IDentification) based communication solutions have been widely used nowadays for mobile environments such as access control for secure system, ticketing systems for transportation, and sport events. These systems usually depend on readers that are not continuously connected to a secure backend system. Thus, the readers should be able to perform their duties even in offline mode, which generally requires the management by the readers of the susceptible data. The use of RFID may cause several security and privacy issues such as traceability of tag owner, malicious eavesdropping and cloning of tags. Besides, when a reader is compromised by an adversary, the solution to resolve these issues getting worse. In order to handle these issues, several RFID authentication protocols have been recently proposed; but almost none of them provide strong privacy for the tag owner. On the other hand, several frameworks have been proposed to analyze the security and privacy but none of them consider offline RFID system.Motivated by this need, in this paper, we first revisit Vaudenay's model, extend it by considering offline RFID system and introduce the notion of compromise reader attacks. Then, we propose an efficient RFID mutual authentication protocol. Our protocol is based on the use of physically unclonable functions (PUFs) which provide cost-efficient means to the fingerprint chips based on their physical properties. We prove that our protocol provides destructive privacy for tag owner even against reader attacks.  相似文献   

18.
随着RFID技术的日益普及,安全问题,特别是用户隐私问题变得日益严重.在现有RFID认证协议的基础上,将双向认证与密钥加密算法有机地结合,较好地解决了RFID的安全隐患问题.该协议具有抗重放、抗分析、防伪造、防跟踪等特性.对该协议的安全性和性能进行比较分析,结果表明该协议可以为RFID系统提供较好的安全性.  相似文献   

19.
分析了RFID技术的安全性问题,构建了图书馆RFID系统的安全模型,设计了一个确保图书馆RFID系统安全性的认证协议PA-Lock协议,以解决标签与读写器之间的保密和双向鉴别问题。最后,对PA-LOCK协议进行了安全性能分析并与其他协议做了比较,证明了该协议的安全性和高效性。  相似文献   

20.
柳毅  顾国生 《计算机科学》2017,44(2):206-208, 227
RFID技术是一种广泛应用于各种物体识别和跟踪的自动识别技术,它适用于多个领域。然而,设计出一个安全的轻量级的RFID认证协议是一项具有挑战性的任务。最近Kulseng等人提出了一种轻量级RFID认证协议,该协议采用物理不可克隆技术和线性反馈移位寄存器来实现,非常适合轻量级操作。分析发现,该协议存在几个严重的安全问题。在分析上述协议的基础上,提出了一种新的轻量级RFID双向认证协议。分析表明,新协议在保持轻量级操作的同时,具有更好的安全性和保密性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号