会议专题

A Security Protocol Designed with Proxy for RFID

(Radio Frequency Identification) is a widely used auto identification technology,its security issues cause for much concern in practical applications. So far, experts from industry and academia have proposed a series of solutions, including physical methods, security protocols based on cryptography, and hardware encryption technique, etc. However, defects also exist in most of them, which fail to ulfill the security requirements of RFID systems. In consequence, we propose a new security protocol designed with proxy, demonstrating a good fusion of physical methods and security protocols. After the corresponding theoretic comparing and analysis, it is indicated that the new protocol can efficiently defend RFID systems against monitoring, deception, tracking, replay attacks, and greatly decrease the possibility of suffering denial of service. The asynchronous problem on systemic information might caused by ID-updating is also discussed to lessen the authentication failure of the legal tags.

RFID Physical methods Security protocols Proxy

Zhou Jun Xu Yong-jun Li Xiao-wei

Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100190,China Beihang Universit Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100190,China

国际会议

第四届全国可信计算学术会议

宜昌

英文

427-431

2010-10-10(万方平台首次上网日期,不代表论文的发表时间)