全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

RFID标签的不可追踪性

DOI: 10.13190/jbupt.201002.44.269, PP. 44-47

Keywords: 无线射频识别,标签,不可追踪性,串空间,协议

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了形式化分析无线射频识别(RFID)协议中标签的不可追踪性,对串空间模型进行了扩展,引入了分析标签不可追踪性的能力,并给出了不可追踪性的判定定理.基于扩展的串空间模型,对Feldhofer协议和O′FRAP协议进行了分析.结果表明,Feldhofer协议能实现不可追踪性,O′FRAP协议对于主动攻击者不能实现不可追踪性.

References

[1]  Juels A. RFID security and privacy: a research survey[J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2): 381-394.
[2]  Le T V, Burmester M, Medeiros B. Universally composable and forward secure RFID authentication and authenticated key exchange//ASIACCS07. New York: ACM Press, 2007: 242-252.
[3]  Cao T J, Bertino E. Security analysis of the SASI protocol[J]. IEEE Transactions on Dependable and Secure Computing, 2009, 6(1): 73-77.
[4]  Song B, Mitchell J C. RFID authentication protocol for low-cost tags//WiSec08. New York: ACM Press, 2008: 140-147.
[5]  Chien H Y, Huang C W. Security of ultra-lightweight RFID authentication protocols and its improvements[J]. ACM Operating System Review, 2007, 41(2): 83-86.
[6]  Thayer F, Herzog J C, Guttman J D. Strand spaces: proving security protocols correct[J]. Journal of Computer Security, 1999, 7(2): 191-230.
[7]  龙士工, 罗文俊, 袁超伟, 等. 串空间模型中的口令猜测攻击[J]. 北京邮电大学学报, 2007, 30(1): 62-65. Long Shigong, Luo Wenjun, Yuan Chaowei, et al. The guess attacks in the strand space model[J]. Journal of Beijing University of Posts and Telecommunications, 2007, 30(1): 62-65.
[8]  Garcia F D, Hasuo I, Pieters W, et al. Provable anonymity//FMSE. Virginia: IEEE Press, 2005: 63-72.
[9]  Feldhofer M, Dominikus S, Wolkerstorfer J. Strong authentication for RFID systems using the AES algorithm//CHES04. Berlin: Springer-Verlag, 2004: 357-370.
[10]  Ouafi K, Phan R. Traceable privacy of recent provably-secure RFID protocols//ACNS08. New York: ACM Press, 2008: 479-489.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133