摘要: 针对射频识别(RFID)搜索协议的特殊性,对RFID搜索协议的安全需求进行了扩展,并根据扩展后的安全需求,对原先的 SSP协议进行一些必要的安全性增强和改进,提出了一种可防碰撞的RFID安全搜索协议,称之为SSP+协议。对SSP+协议的安全性分析表明,改进后的RFID搜索协议不仅能满足隐私保护、匿名、并发安全、防追踪等一般性的安全需求,还能消除因碰撞问题造成的安全隐患,满足了防碰撞这一搜索协议独特的安全需求。
[1] 孙其博,刘杰,黎羴,等.物联网:概念、架构与关键技术研究综述[J].北京邮电大学学报,2010,33(3):1-9 [2] 卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752 [3] Tan C C,Sheng B,Li Q.Serverless search and authentication protocols for RFID[C]∥5th IEEE International Conference on Pervasive Computing and Communications.New York:IEEE Press,2007:24-29 [4] Ahamed S,Rahman F,Hoque E,et al.S3PR:secure serverless search protocols for RFID[C]∥International Conference on Information Security and Assurance.Hawaii:IEEE Press,2008:187-192 [5] Kulseng L,Yu Z,Wei Y.Lightweight secure search protocols forlow-cost RFID systems[C]∥29th International Conference on Distributed Computing Systems.Washington:IEEE Press,2009:40-48 [6] 邓淼磊,衡晓鹏,鲁志波.安全的RFID搜索协议[J].西安通信学院学报,2009,8(5):78-81 [7] 曹峥,邓淼磊.通用可组合的RFID搜索协议[J].华中科技大学学报:自然科学版,2011,39(4):56-59 [8] van Le T,Burmester M,Medeiros B.Universally composableand forward secure RFID authentication and authenticated key exchange[C]∥Proc.of the 2nd ACM Symposium on Information,Computer and Communications Security.New York:ACM,2007:242-252 [9] Burmester M,van Le T,Medeiros B.Provably secure ubiquitous systems:Universally composable RFID authentication protocols[C]∥Proc.of the 2nd International Conference on Security and Privacy in Networks.Maryland:IEEE Press,2006:176-186 [10] 邓淼磊,马建峰,周利华,等.RFID匿名认证协议的设计[J].通信学报,2009,30(7):24-31 [11] Lee S M,Hwang Y J,Lee D H.Efficient authentication for low-cost RFID systems[C]∥Proc.of the International Conference on Computational Science and Its Applications (ICCSA2005).Berlin:Springer-Verlag,2005:619-627 [12] Canetti R.Universally composable security:a new paradigm for cryptographic protocols[C]∥42th IEEE Annual Symposium on Foundations of Computer Science.Oakland:IEEE Press,2001:136-145 [13] Kurosawa K,Furukawa J.Universally composable undeniablesignature[C]∥Proc.of ICALP’08.Berlin:Springer-Verlag,2008:524-535 [14] Canetti R,Herzog J.Universally composable symbolic analysis of mutual authentication and key-exchange protocols[C]∥Theo-ry of Cryptography Conference.Berlin:Springer-Verlag,2006:380-403 |
No related articles found! |
|