首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于动态ID刷新机制的低成本RFID标签双向认证协议(英文)
引用本文:李剑,宋丹劼,郭晓静,谢丰,彭勇.一种基于动态ID刷新机制的低成本RFID标签双向认证协议(英文)[J].中国通信学报,2011,8(7):122-127.
作者姓名:李剑  宋丹劼  郭晓静  谢丰  彭勇
基金项目:supported by National Natural Science Foundation of China under Grant No. 61100205; Foundation of China Information Technology Security Evaluation Center under Grant No. CNITSEC-KY-0910-019/5
摘    要:In order to solve the various privacy and security problems in RFID system, a new low-cost RFID mutual authentication protocol based on ID updating mechanics is proposed. In the proposed scheme, the backend server keeps both the current ID and potential next ID for each tag, thus to solve the possible problem of de-synchronization attack in the most ID updating-based schemes. In the security analysis section, comparing several protocols in property required and attacker resistances, the comparison results s...

收稿时间:2011-12-26;

ID Updating-Based RFID Mutual Authentication Protocol for Low-Cost Tags
Li Jian,Song Danjie,Guo Xiaojing,Xie Feng,Peng Yong.ID Updating-Based RFID Mutual Authentication Protocol for Low-Cost Tags[J].China communications magazine,2011,8(7):122-127.
Authors:Li Jian  Song Danjie  Guo Xiaojing  Xie Feng  Peng Yong
Affiliation:1School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876, P. R. China
2Technical Assessment Research Laboratory, China Information Technology Security Evaluation Center, Beijing 100085, P. R. China
Abstract:In order to solve the various privacy and security problems in RFID system, a new low-cost RFID mutual authentication protocol based on ID updating mechanics is proposed. In the proposed scheme, the backend server keeps both the current ID and potential next ID for each tag, thus to solve the possible problem of de-synchronization attack in the most ID updating-based schemes . In the security analysis section, comparing several protocols in property required and attacker resistances, the comparison results show that the proposed protocol provides strong authentication and strong integrity of the transmissions and can withstand most the possible attacks that break the security of the previous schemes. In the performance evaluation section, the analysis results also indicate that, in terms of computational cost and storage require-ment, the proposed scheme is safer, more efficient, more suitable for low-cost tag and more feasible in practice.
Keywords:Internet of Things  RFID  mutual au-thentication  ID updating  security analysis  per-formance evaluation
本文献已被 维普 等数据库收录!
点击此处可从《中国通信学报》浏览原始摘要信息
点击此处可从《中国通信学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号