RFID System Security Using Identity-Based Cryptography

被引:2
|
作者
Chen, Youqin [1 ]
Chen, Zhide [1 ]
Xu, Li [1 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou 350007, Fujian Province, Peoples R China
关键词
RFID; Secure Two-way Authentication Protocol; Learning Parity in the Presence of Noise; HB; HB+; HB++;
D O I
10.1109/IITSI.2010.52
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Two-way authentication is one of the key solutions to improve the security of RFID Tag/Reader due to many attacks on HB, HB+ and HB++. In this paper, we analysis HB, HB+ and HB++ and propose a modified protocol, a two-way authentication to avoid the attacks.
引用
收藏
页码:460 / 464
页数:5
相关论文
共 50 条
  • [1] RFID system security using identity-based cryptography
    Liang, Yan
    Rong, Chunming
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 482 - 489
  • [2] ZigBee security using identity-based cryptography
    Nguyen, Son Thanh
    Rong, Chunming
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 3 - +
  • [3] Identity-based cryptography for grid security
    Lim, HW
    Paterson, KG
    FIRST INTERNATIONAL CONFERENCE ON E-SCIENCE AND GRID COMPUTING, PROCEEDINGS, 2005, : 395 - 404
  • [4] Identity-based cryptography for grid security
    Lim, Hoon Wei
    Paterson, Kenneth G.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (01) : 15 - 32
  • [5] Survey of security on identity-based cryptography
    College of Computer Science and Technology, Jilin University, Changchun 130012, China
    不详
    Jisuanji Yanjiu yu Fazhan, 2009, 9 (1537-1548):
  • [6] Identity-based cryptography for grid security
    Hoon Wei Lim
    Kenneth G. Paterson
    International Journal of Information Security, 2011, 10 : 15 - 32
  • [7] Security bootstrapping of mobile ad hoc networks using identity-based cryptography
    Mehr, Kamal Adli
    Niya, Javad Musevi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1374 - 1383
  • [8] Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography
    Yan, Liang
    Rong, Chunming
    Zhao, Gansen
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 167 - +
  • [9] Datagram Transport Layer Security Protocol with Identity-Based Cryptography
    School of Computer, National University of Defense Technology, Changsha
    410073, China
    Ruan Jian Xue Bao, (90-97):
  • [10] Body Sensor Network Security: An Identity-Based Cryptography Approach
    Tan, Chiu C.
    Wang, Haodong
    Zhong, Sheng
    Li, Qun
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 148 - 153