期刊文献+

RFID标签所有权转换模式及协议设计 被引量:12

Design of RFID Tag Ownership Transfer Mode and Protocols
下载PDF
导出
摘要 针对射频识别标签所有权转换过程的安全隐私问题,提出一种"先授权后更新"的所有权转换模式,并设计相应的实现协议。在密钥协商后,把标签的全部相关信息安全地转交给新的所有者。在相互认证的基础上,安全更新标签秘密,使得原所有者无法再对标签进行查询。该方案保证所有权转换过程中新用户的隐私安全。 Aiming at security and privacy threats during Radio Frequency Identification(RFID) tag ownership transfer, this paper proposes a "first delegation then update" ownership transfer mode. Corresponding protocols of the mode are also designed. All the information about the tag is transmitted to the new owner securely after a key negotiation. The tag's secret is updated securely after a mutual authentication, which makes the old owner can not query the tag any longer. The scheme ensures the privacy and security of the new owner in the ownership transfer.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第15期143-145,共3页 Computer Engineering
关键词 射频识别 所有权转换 授权 密钥协商 安全 Radio Frequency Identification(RFID) ownership transfer delegation key negotiation security
  • 相关文献

参考文献6

  • 1Molnar D,Soppera A,Wagner D.A Scalable,Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags[C]//Proc.of SAC'05.Kingston,Jamaica:Spdnger-Verlag,2005:276-290.
  • 2Lim C H,Kwnn T.Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer[C]//Proc.of ICICS'06.North Carolina,USA:Springer-Vedag,2006:1-20.
  • 3Fouladgar S,Afifi H.An Efficient Delegation and Transfer of Ownership Protocol for RDID Tags[C]//Proc.of the 1st International Workshop on RFID Technology.Vienna,Austria:[s.n.],2007.
  • 4Osaka K,Takagi T,Yamazald K,et al.An Efficient and Secure RFID Security Method with Ownership Transfer[C]//Proc.of CIS'06.[S.l.]:Springer-Vedag,2007:778-787.
  • 5Lei Hong,CAO Tianjie.RFID Protocol Enabling Ownership Transfer to Protect Against Traceability and DoS Attacks[C]//Proc.of ISDPE'07.Chengdu,China:[s.n.],2007:508-510.
  • 6Bellovin S M,Merritt M.Encrypted Key Exchange:Password-based Protocols Secure Against Dictionary Attacks[C]//Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy.Oakland,USA:[s.n.],1992:72-84.

同被引文献69

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2李建华,张爱新,薛质.网络安全协议的形式化分析与验证[M].北京:机械工业出版社,2010.
  • 3MolnarD, Soppera A, Wagner D. A Scalable,Delegatable Pseudonym Protocol Enabling OwnershipTransfer of RFID Tags[C]. Lecture Notes inComputer Science, 2006,Volume 3897/2006, 276—290,Springer.Link.
  • 4SaitoJ,1mamoto K, Sakurai K. ReassignmentScheme of an RFID Tags Key for OwnerTransferee. Lecture Notes in Computer Science,2005,Volume 3823/2005,1303—1312,SpringerLink.
  • 5LimC H, Kwon T. Strong and Robust RFIDAuthentication Enabling Perfect Ownership Transferee].Lecture Notes in Computer Science, 2006,Volume4307/2006, 1-20, Springer Link.
  • 60 s a k a K,T a k a g i T,Yamazaki K.An efficient and secure RFID securitymethod with ownership transfer[C]. LectureNotes in Computer Science,2007,Volume4456/2007,778-787,SpringerLink.
  • 7BoyeonS. RFID Tag Ownership Transferee.Proc. Workshop on RFID Security, 2008. http://events. iaik. tugraz. at/RFIDSecO 8/Papers/Publication.
  • 8邵婧.RFiD标签所有权转换机制研究[D].河南郑州:解放军信息工程大学,2009: 8-67.
  • 9KulsengL, Zhen Yu, Yawen Wei, Yong Guan.Lightweight Mutual Authentication and OwnershipTransfer for RFID Systems[C]. IEEE INFOCOM 2010proceedings, 1—5.
  • 10金永明,孙惠平,关志,陈忠.R^D标签所有权转移协议研究[J].计算机发展与研究,201I,48(8): 1400-140.

引证文献12

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部