期刊文献+

面向RFID应用的轻量级加密算法分类模型研究 被引量:4

Research on Classification Model of Lightweight Encryption Algorithm for RFID Applications
在线阅读 下载PDF
导出
摘要 信息加密是对RFID标签进行安全防护和认证的重要手段,目前已设计出的大量轻量级加密算法,由于针对的实现平台标准不同,参数不一,缺少通用的分类模型或选取原则。为了使现有的轻量级加密算法能够满足具有不同成本、计算能力、存储空间等差异的标签的应用需求,论文设计了一种面向RFID应用的轻量级加密算法的三维分类模型,并通过实例分析验证了模型的可用性。 Information encryption is an important means for the security and authentication of RFID tags.At present,a largenumber of lightweight encryption algorithms have been designed,because of different standards for the implementation platform,dif?ferent parameters,there is no general classification model or selection principle.In order to make the existing lightweight encryptionalgorithm can meet with different cost and computing power,storage space and difference label application requirements,in this pa?per,a three-dimensional classification model for the application of RFID lightweight encryption algorithm is designed,and theavailability of the model is verified through the example analysis.
作者 汪亚 魏国珩 魏巍 WANG Ya;WEI Guoheng;WEI Wei(Department of Information Security,Naval University of Engineering,Wuhan 430033;Naval Command College of PLA,Nanjing 218000)
出处 《计算机与数字工程》 2017年第6期1150-1155,1241,共7页 Computer & Digital Engineering
关键词 RFID 轻量级算法 分类模型 RFID,lightweight encryption,classification model
  • 相关文献

参考文献3

二级参考文献64

  • 1Beresford, Alastair R.,Stajano, Frank.Location privacy in pervasive computing. IEEE Pervasive Computing . 2003
  • 2Bellovin S M,Merritt M.Encrypted key exchange: Password-based protocols secure against dictionary attacks. Proceedings of the IEEE Symposium on Research in Security and Privacy . 1992
  • 3Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology-EUROCRYPT’03 . 2003
  • 4Rolf H. Weber.Internet of Things – New security and privacy challenges[J]. Computer Law and Security Review: The International Journal of Technology and Practice . 2010 (1)
  • 5Benjamin Fabian,Oliver Günther.Security challenges of the EPCglobal network[J]. Communications of the ACM . 2009 (7)
  • 6Dibyendu Chakrabarti,Subhamoy Maitra,Bimal Roy.A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design[J]. International Journal of Information Security . 2006 (2)
  • 7Juels A,Rivest RL,Szydlo M.The blocker tag:Selective blocking of RFID tags for consumer privacy. Proceedings of the 10th ACM Conference on Computerand Communications Security(CCS 2003) . 2003
  • 8BAUER K,LEE H.A distributed authentication scheme for a wire-less sensing system. ACM Transactions on Information and Sys-tem Security . 2008
  • 9Bellare M,Canetti R,Krawczyk H.Keyed Hash Functions and Message Authentication. Advances in Cryptology-CRYPIO’96 . 1996
  • 10C.Floerkemeier,M.Langheinrich,E.Fleisch,F.Mattern,S.E.Sarma."The Internet of Things,". First international conference,IOT 2008 . 2008

共引文献82

同被引文献23

引证文献4

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部