A Security Protocol Designed with Proxy for RFID
(Radio Frequency Identification) is a widely used auto identification technology,its security issues cause for much concern in practical applications. So far, experts from industry and academia have proposed a series of solutions, including physical methods, security protocols based on cryptography, and hardware encryption technique, etc. However, defects also exist in most of them, which fail to ulfill the security requirements of RFID systems. In consequence, we propose a new security protocol designed with proxy, demonstrating a good fusion of physical methods and security protocols. After the corresponding theoretic comparing and analysis, it is indicated that the new protocol can efficiently defend RFID systems against monitoring, deception, tracking, replay attacks, and greatly decrease the possibility of suffering denial of service. The asynchronous problem on systemic information might caused by ID-updating is also discussed to lessen the authentication failure of the legal tags.
RFID Physical methods Security protocols Proxy
Zhou Jun Xu Yong-jun Li Xiao-wei
Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100190,China Beihang Universit Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100190,China
国际会议
宜昌
英文
427-431
2010-10-10(万方平台首次上网日期,不代表论文的发表时间)