RFID标签的安全建模及对EPCC1G2协议的改进  被引量:8

Security Modeling for RFID Tag and Safety Improvement of EPC C1G2 Protocol

在线阅读下载全文

作  者:于宇[1] 杨玉庆[1] 闵昊[1] 

机构地区:[1]复旦大学专用集成电路与系统国家重点实验室

出  处:《小型微型计算机系统》2007年第7期1339-1344,共6页Journal of Chinese Computer Systems

基  金:国家"八六三"高科技研究发展项目(2005AA1Z1300)资助.

摘  要:作为未来对于物体的识别技术,射频识别在人们生活中占有越来越重要的地位.这项技术将不断深入社会生活,在人们周围无处不在.由于这项技术的广泛应用,它的安全性以及涉及到个人生活的隐私问题不得不引起各界的关注.最初考虑到读卡器和标签之间通讯的可视性以及因特网络潜在的诸多攻击,研究者主要针对读卡器和后端数据库的通讯安全问题,做出了很多的工作.随着UHF标签的推行,读卡器和射频标签通讯范围增大,它们之间的通讯不再安全.本文针对读卡器和标签之间通讯中可能受到的攻击进行分析,建立了一个保证它们通讯安全的模型,依据该模型对EPC C lass1 G en2(EPC C 1G 2)协议进行分析,指出了协议可能受到的攻击,并提出了具有身份验证功能的协议修改方案.Radio-frequency identification (RFID) is expected to take an important role for object identification as a ubiquitous infrastructure. As it will be pervasive in the social life,the security and privacy have to be concerned. Many jobs have been done in the communication between the reader and the backend database, however as an integrated technology the security of the reader and tag channel is also a weak point to be attacked. The challenge to provide RFID tag security is the limitation of its power resource,its cost requirement and even more the communication speed users bear such as EPC C1G2 standard defines the margin time the tag can process instructions. A peculiar security model of the channel between reader and tag is described in this paper,and based on the EPC CIG2 protocol the vulnerable points is analysed. The resource on the tag is recounted regarding the protocol. A modified scheme with security strategy is also suggested afterwards.

关 键 词:RFID 信息安全 EPC C1G2 TEA 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象