首页> 外文会议>International Conference on Science of Cyber Security >Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints
【24h】

Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints

机译:具有存储约束的RFID身份验证协议的最佳键树

获取原文

摘要

Tree-based RFID authentication protocols provide an efficient solution for lowering authentication delay, but level of privacy provided by tree-based systems decreases considerably if some members are compromised and secret keys are probed. In the RFID system, Tags are severely limited in terms of computational power and storage. A large amount of research focused on optimizing the key-tree has been launched, yet none of them consider the Tags' storage constraints. In this paper, we introduce a new privacy metric expression for measuring the resistance of the system to a single compromised member; we furtherly extend the research work of Buttyan et al. and Beye et al. by proposing two optimization problems respecting storage constraints. In addition, we show how to construct the optimal key-tree in order to maximize the system's resistance to single member compromise under the constraints on the Tags' number, the maximum authentication delay and the number of the keys stored in the Tag.
机译:基于树的RFID认证协议为降低认证延迟一个有效的解决方案,但如果一些成员受到损害和秘密密钥进行探测的基于树状系统提供的隐私水平显着降低。在RFID系统中,标签被狠狠的计算能力和存储方面的限制。大量的研究侧重于优化关键树已经启动了,但他们没有考虑到标签的存储限制。在本文中,我们介绍用于测量系统中的单一构件受损的电阻的新的隐私度量表达;我们furtherly延长Buttyan等人的研究工作。和贝耶等。通过提出两种优化问题,尊重存储限制。另外,我们将展示如何构建最优的关键树,以最大限度的标签号,最大的认证延迟和存储在标签中的键的数量约束下系统对单个成员的妥协性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号