期刊文献+

物理不可克隆函数在射频身份识别系统的应用研究 被引量:1

原文传递
导出
摘要 射频身份识别(Radio Frequency Identification,RFID)技术是一项利用特定频率的无线电信号,使通信双方无接触即可实现身份认证功能的技术[1].使用RFID技术的系统称为RFID系统,其通常包括电子标签、读卡器和服务器三部分.读卡器无需与电子标签接触就能通过无线传输方式读取到电子标签的身份认证信息,然后将该信息传送至服务器,服务器再对信息进行处理,从而实现对电子标签的快速高效管理.RFID技术是物联网应用领域的重要技术之一,广泛应用于门禁防盗、周界预警、物资管理、仓储物流等多个领域,但其读卡器和电子标签之间的无线通信存在被攻击的安全问题.本文研究了物理不可克隆函数(Physical Unclonable Function,PUF)技术在RFID系统的应用,通过PUF技术提升RFID系统无线通信过程中的安全保密能力.
作者 张林坤 柴智
出处 《中国安防》 2023年第7期105-108,共4页 China Security & Protection
  • 相关文献

参考文献3

二级参考文献29

  • 1Peris-Lopez P, Orfila A, Hemandez-Castro J, et al. Flaws on RFID grouping-proofs. Journal of Network and Computer Applications, 2011, 34(3): 833-845.
  • 2Park C, Hur J, Hwang S, et al. Authenticated public key broadcast encryption scheme secure against insiders. Journal of Mathematical and Computer Modeling, 2012, 55(1/2): 113-122.
  • 3Sadigbian A, Jalili R. AFMAP: anonymous forward-secure mutual authentication protocols for RFID systems. Proceedings of the 3rd International Conference on Emerging Security Information, Systems and Technologies (SECURWARE'09), Jun 18-23, 2009, Athens, Greece. Piscataway, NJ, USA: IEEE, 2009:31-36.
  • 4Batina L, Lee Y, Seys S, et al. Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Personal and Ubiquitous Computing, 2012, 16(3): 323-335.
  • 5Wong C, Gouda M, Lain, S. Secure group communications using key graphs. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM'98), Sep 2-4, 1998, Vancouver, Canada. New York, NY, USA: ACM, 1998:68-79.
  • 6Ma C, Lin J, Wang Y, et al. Offiine RFID grouping proofs with trusted timestamps. Proceedings of the l lth IEEE Intematiunal Conference on Trust, Security and Privacy in Computing and Communications (TrustCom' 12), Jun 25-27, 2012, Liverpool, UK. Los Alamitos, CA, USA: IEEE Computer Society, 2012:674-681.
  • 7Lin Q, Zhang F. ECC-based grouping-proofRFID for inpatient medication safety. Journal of Medical Systems, 2012, 36(6): 3527-3531.
  • 8Dang 0 N, Kim K. On the security of RFID group scanning protocols. IEICE Transactions on Information and Communication Systems, 2010, 930(3): 528-530.
  • 9Leng X, Lien Y, Mayes K, et al. Select-response grouping proof for RFID tags. Proceedings of the I st Asian Conference on Intelligent Information and Database Systems (ACIIDS'09), Apr 1-3, Dong Hoi, Vietnam. Piscataway, NJ, USA: IEEE, 2009: 73-77.
  • 10Burmester M, Medeiros B, Motta R. Provably secure grouping-proofs for RFID tags. Proceeding of the 8th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CAROIS'08), Sep 8-11, 2008, London, UK. Berlin, Germany: Springer-Verlag, 2008: 176-190.

共引文献7

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部