Institute of Computing Technology, Chinese Academy IR
A SECURITY MECHANISM FOR RFID WITH DEPENDABLE PROXY | |
Zhou, Jun1,2; Xu, Yongjun1; Li, Xiaowei1 | |
2011 | |
发表期刊 | INTELLIGENT AUTOMATION AND SOFT COMPUTING |
ISSN | 1079-8587 |
卷号 | 17期号:6页码:815-825 |
摘要 | RFID (Radio Frequency Identification) is a non-contact auto identification technology widely applied in many fields nowadays, while its security issues also get much concern in practical applications. So far, experts from industry and academia have proposed a series of solutions, mainly including physical methods, security protocols based on cryptography, hardware encryption technique and so on. However, various defects still exist in all the three categories, which may lead to the failure to achieve the security requirements of RFID systems. Aiming to make a further improvement to these solutions, we propose a security mechanism designed with dependable proxy in this paper, which demonstrates a good fusion of physical methods and security protocols. In allusion to the new scheme, we use BAN logic to do the formal analysis to derive the security objectives of our mechanism. Subsequently, given the corresponding theoretic analysis and comparison, it is indicated that the new mechanism can efficiently defend RFID systems against monitoring, deception, tracking, replay attacks, and greatly decrease the possibility of suffering denial of service. The asynchronous problem that may arise on systemic information is also discussed to lessen the authentication failure of the legal tags. |
关键词 | RFID physical methods security protocols proxy BAN logic |
收录类别 | SCI |
语种 | 英语 |
WOS研究方向 | Automation & Control Systems ; Computer Science |
WOS类目 | Automation & Control Systems ; Computer Science, Artificial Intelligence |
WOS记录号 | WOS:000294522200015 |
出版者 | AUTOSOFT PRESS |
引用统计 | |
文献类型 | 期刊论文 |
条目标识符 | http://119.78.100.204/handle/2XEOYT63/12993 |
专题 | 中国科学院计算技术研究所期刊论文_英文 |
通讯作者 | Zhou, Jun |
作者单位 | 1.Chinese Acad Sci, Inst Comp Technol, Beijing 100190, Peoples R China 2.Beihang Univ, Beijing 100190, Peoples R China |
推荐引用方式 GB/T 7714 | Zhou, Jun,Xu, Yongjun,Li, Xiaowei. A SECURITY MECHANISM FOR RFID WITH DEPENDABLE PROXY[J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING,2011,17(6):815-825. |
APA | Zhou, Jun,Xu, Yongjun,&Li, Xiaowei.(2011).A SECURITY MECHANISM FOR RFID WITH DEPENDABLE PROXY.INTELLIGENT AUTOMATION AND SOFT COMPUTING,17(6),815-825. |
MLA | Zhou, Jun,et al."A SECURITY MECHANISM FOR RFID WITH DEPENDABLE PROXY".INTELLIGENT AUTOMATION AND SOFT COMPUTING 17.6(2011):815-825. |
条目包含的文件 | 条目无相关文件。 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论