期刊文献+

RFID标签所有权转移协议研究 被引量:33

Ownership Transfer Protocol for RFID Tag
下载PDF
导出
摘要 无线射频识别技术(RFID)是适用于普适计算环境的技术之一,它的应用正在变得随处可见.RFID安全与隐私问题是这些应用的基本需求之一.由于RFID标签的资源限制,传统的安全元素不能很好地应用到RFID标签中.因此,设计轻量级的安全机制非常重要.应用中,贴有标签的物品经常发生所有权的转移.这就需要保护原所有者与新所有者的隐私.基于SQUASH方案,一种具有可证安全属性的消息认证码机制,提出了一种新的轻量级所有权转移协议.新协议比基于Hash的方案具有更高的效率.同时,它还具有很强的安全特性.新协议是第1个基于SQUASH的方案,优化了所有权转移协议,去掉了Hash方案中不需要的特性.最后,新协议完全满足所有权转移协议的要求,可有效保护原所有者与新所有者的前向与后向隐私. Abstract Radio frequency identification (RFID) is becoming ubiquitous at present, which is suitable for ubiquitous computing environment. Its flexibility holds great promise for novel applications, and increasingly RFID tags are being deployed. RFID security and privacy is the basic requirement in most applications. Conventional security primitives cannot be integrated in RFID tags as they have inadequate computation capabilities with extremely limited resources. Therefore, it is important to have some lightweight security mechanisms suitable for RFID tags. A tagged item will be often passed to a new owner. The privacy of the new (as well as the past) owner should be guaranteed. Based on SQUASH a message authentication code (MAC) with provable security properties for highly constrained devices, a new lightweight ownership transfer protocol is proposed. The new protocol has more efficient performance than other Hash-based schemes. Moreover, it achieves very strong notion of security and it is the first protocol based on SQUASH whose security properties have been proven. Finally, the new protocol can protect the forward and backward privacy of both parties that is very important requirement in the ownership transfer application.
出处 《计算机研究与发展》 EI CSCD 北大核心 2011年第8期1400-1405,共6页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60773163)
关键词 安全 认证 所有权转移协议 无线射频识别 隐私保护技术 security authentication ownership transfer protocol RFID privacy protectiontechnology
  • 相关文献

参考文献12

  • 1Juels A, Weis S A. Authenticating pervasive devices with human protocols [G] //I.NCS 3621: Proc of Advances in Cryptology CRYPTO 2005. Berlin.. Springer, 2005:293-308.
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 3丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592. 被引量:93
  • 4Song B, Mitchell C J. REID authentication protocol for low cost tags [C] //Proc of ACM Conf on Wireless Network Security WiSec'08. New York: ACM, 2008:140-147.
  • 5Molnar D, Soppera A, Wagner D. A scalable, delegatable pseudonym protocol enabling ownership transfer of RF1D tags [G] //LNCS 3897: Proc of Selected Areas in Cryptography SAC 2005. Berlin: Springer, 2005: 276-290.
  • 6Saito J, Imamoto K, Sakurai K. Reassignment scheme of an RFID tags key for owner transfer [G]//LNCS 3823 : Proc of Embedded and Ubiquitous Computing EUC 2005 Workshoos. Berlin, SDrinuer, 2005, 1303-1312.
  • 7Osaka K, Takagi T, Yamazaki K, et al. An efficient and secure RFID security method with ownership transfer [G] // LNCS 4456: Proc of Computational Intelligence and Security CIS 2006. Berlin: Springer, 2006:778-787.
  • 8Fouladgar S, Afifi H. An efficient delegation and transfer of ownership protocol for RFID tags[C] //Proc of the 1st Int EURASIP Workshop on RFID Technology. Piseataway, NJ IEEE, 2007: 10-14.
  • 9Jappinen P, Hamalainen H. Enhanced RFID security method with ownership transfer [C]//Proc of 2008 Int Conf on Computational Intelligence and Security. Piseataway, NJ: IEEE, 2008: 382-385.
  • 10Song B. RFID tag ownership transfer [C/OL]/Proc of the Confon RFID Security. 2008. [2011-04-01]. http://event. iaik. tugraz, at/RFIDSecOS/Papers.

二级参考文献64

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170

共引文献267

同被引文献224

  • 1罗亮辉,胡福乔.射频卡智能水表的研制[J].自动化仪表,2005,26(2):33-34. 被引量:7
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 3位永辉,刘笃仁.基于MF RC500的非接触式IC卡读写器设计[J].电子元器件应用,2007,9(5):1-4. 被引量:12
  • 4李凤华,冯涛,马建峰.基于VSPH的UC不经意传输协议[J].通信学报,2007,28(7):28-34. 被引量:8
  • 5胡向东,魏琴芳,向敏.物联网安全[M].北京:科学出版社,2012.
  • 6胡文锋,王玲玲RFID技术在高校实验室设备管理中的应用[J].实验室研究与探索,2011(6):392-395.
  • 7Osaka K, Takagi T, Yamazaki K, et al. An Efficient and Secure RFID Security Method with Ownership Transfer[C]//RFID Security. New York: Springer U S, 2009: 147-176.
  • 8Yoon E J, Yoo K Y. Two Security Problems of RFID Security Method with Ownership Transfer[C]//Network and Parallel Computing. Shanghai: IFIP International Conference on IEEE, 2008.. 68-73.
  • 9Chen H B, Lee W B, Zhao Y H, et al. Enhancement of the RFID Security Method with Ownership Transfer[C]//Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication. New York:ACM, 2009:251 254.
  • 10Wang Shao-hui. Analysis and Design of RFID Tag Ownership Transfer Protocol[C]//Proceedings of the 2011 International Conference on Informatics, Cybernetics and Computer Engineering. Berlin:Springer Berlin Heidelberg, 2012: 229-236.

引证文献33

二级引证文献80

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部