检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
出 处:《小型微型计算机系统》2007年第7期1339-1344,共6页Journal of Chinese Computer Systems
基 金:国家"八六三"高科技研究发展项目(2005AA1Z1300)资助.
摘 要:作为未来对于物体的识别技术,射频识别在人们生活中占有越来越重要的地位.这项技术将不断深入社会生活,在人们周围无处不在.由于这项技术的广泛应用,它的安全性以及涉及到个人生活的隐私问题不得不引起各界的关注.最初考虑到读卡器和标签之间通讯的可视性以及因特网络潜在的诸多攻击,研究者主要针对读卡器和后端数据库的通讯安全问题,做出了很多的工作.随着UHF标签的推行,读卡器和射频标签通讯范围增大,它们之间的通讯不再安全.本文针对读卡器和标签之间通讯中可能受到的攻击进行分析,建立了一个保证它们通讯安全的模型,依据该模型对EPC C lass1 G en2(EPC C 1G 2)协议进行分析,指出了协议可能受到的攻击,并提出了具有身份验证功能的协议修改方案.Radio-frequency identification (RFID) is expected to take an important role for object identification as a ubiquitous infrastructure. As it will be pervasive in the social life,the security and privacy have to be concerned. Many jobs have been done in the communication between the reader and the backend database, however as an integrated technology the security of the reader and tag channel is also a weak point to be attacked. The challenge to provide RFID tag security is the limitation of its power resource,its cost requirement and even more the communication speed users bear such as EPC C1G2 standard defines the margin time the tag can process instructions. A peculiar security model of the channel between reader and tag is described in this paper,and based on the EPC CIG2 protocol the vulnerable points is analysed. The resource on the tag is recounted regarding the protocol. A modified scheme with security strategy is also suggested afterwards.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.40