http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
A Strong Lightweight Authentication Protocol for Low-cost RFID Systems
Zhicai Shi,Josef Pieprzyk,Christophe Doche,Yongxiang Xia,Yu Zhang,Jian Dai 보안공학연구지원센터 2014 International Journal of Security and Its Applicat Vol.8 No.6
RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for low-cost RFID tags. In order to ensure the security and privacy of low-cost RFID systems we propose a lightweight authentication protocol based on Hash function. This protocol can ensure forward security and prevent information leakage, location tracing, eavesdropping, replay attack and spoofing. This protocol completes the strong authentication of the reader to the tag by twice authenticating and it only transfers part information of the encrypted tag’s identifier for each session so it is difficult for an adversary to intercept the whole identifier of a tag. This protocol is simple and it takes less computing and storage resources, it is very suitable to some low-cost RFID systems.
An Improved HB+ Protocol and its Application to EPC Global Class-1 Gen-2 Tags
Zhicai Shi,Jian Dai,Fei Wu,Yongxiang Xia,Yihan Wang,Changzhi Wang 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.8
RFID is a key technology that can be used to create the pervasive society. The EPCglobal Class-1 Gen-2 specification is an important standard for RFID. The tags conforming to this standard have limited computing and storing resources, and no more attentions are paid to their security and privacy. So the application of these tags is not secure. HB+ protocol is one of the typical lightweight authentication protocols suitable to these low-cost RFID tags. But it is vulnerable to active attacks. For some scenarios with frequent active attacks the efficiency of HB+ protocol will be degraded seriously. In order to improve the security and efficiency of HB+ protocol for some scenarios with frequent active attacks, a novel detection-exit-restart mechanism is proposed to monitor the integrity of the exchanged messages between the reader and the tag. The improved HB+ protocol can resist active attacks and it is more efficient and secure than HB+ protocol. This protocol only uses the computing resources embedded in tags and it is very suitable to low-cost RFID systems.