期刊文献+

基于联合签名的RFID所有权安全转换研究

Research on Tag Ownership Transfer Based on Jiont Signature in RFID System
下载PDF
导出
摘要 标签所有权转换的安全性和可追溯性是其广泛应用必须解决的问题.本文针对供应链中标签所有权转换时易受攻击与标签计算资源有限的缺点,采用联合签名的方法提出标签所有权安全转换协议.该方案既保证了标签传输过程安全,也保证了标签信息的前向和后向安全,同时也可以回溯. The security and traceability of tag ownership transfer is a problem which must be solved be- fore RFID is widely applied. It is used joint signature to propose tag ownership transfer protocols because the computation resource of tag is limited and it is easy to be attacked during the procedure of ownership transfer. The scheme ensures the safety of the transmission process of the tags, and at the same time ensure the forward and backward safety of the tag information, and also can trace back.
机构地区 郑州轻工业学院
出处 《中原工学院学报》 CAS 2013年第4期18-21,共4页 Journal of Zhongyuan University of Technology
基金 河南省科技攻关计划项目(102102310030) 郑州轻工业学院博士基金(2010BSJJ006)支持
关键词 物联网 所有权安全转换 RFID 联合签名 回溯 internet of things ownership secure transfer RFID joint signature backtracking
  • 相关文献

参考文献11

  • 1Osaka K, Takagi T, Yamazaki K, et al. An Efficient and Secure RFID Security Method with Ownership Transfer[C]//RFID Security. New York: Springer U S, 2009: 147-176.
  • 2Yoon E J, Yoo K Y. Two Security Problems of RFID Security Method with Ownership Transfer[C]//Network and Parallel Computing. Shanghai: IFIP International Conference on IEEE, 2008.. 68-73.
  • 3Chen H B, Lee W B, Zhao Y H, et al. Enhancement of the RFID Security Method with Ownership Transfer[C]//Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication. New York:ACM, 2009:251 254.
  • 4邵婧,陈越,甄鸿鹄.供应链环境下的RFID标签所有权转换方案[J].计算机工程与设计,2009,30(24):5618-5621. 被引量:11
  • 5邵婧,陈越,常振华.RFID标签所有权转换模式及协议设计[J].计算机工程,2009,35(15):143-145. 被引量:12
  • 6Wang Shao-hui. Analysis and Design of RFID Tag Ownership Transfer Protocol[C]//Proceedings of the 2011 International Conference on Informatics, Cybernetics and Computer Engineering. Berlin:Springer Berlin Heidelberg, 2012: 229-236.
  • 7金永明,孙惠平,关志,陈钟.RFID标签所有权转移协议研究[J].计算机研究与发展,2011,48(8):1400-1405. 被引量:33
  • 8Molnar D, Soppera A, Wagner D. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags [C]//Selected Areas in Cryptography. Berlin:Springer Berlin Heidelberg, 2006 : 276- 290.
  • 9Lim C H, Kwon T. Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer[C]//Information and Com- munications Security. Berlin:Springer Berlin Heidelberg, 2006 : 1-20.
  • 10Fouladgar S, Afifi H. An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags[M]. Austria,First Inter- national EURASIP Workshop on RFID Technology, 2007.

二级参考文献26

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2Molnar D,Soppera A,Wagner D.A Scalable,Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags[C]//Proc.of SAC'05.Kingston,Jamaica:Spdnger-Verlag,2005:276-290.
  • 3Lim C H,Kwnn T.Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer[C]//Proc.of ICICS'06.North Carolina,USA:Springer-Vedag,2006:1-20.
  • 4Fouladgar S,Afifi H.An Efficient Delegation and Transfer of Ownership Protocol for RDID Tags[C]//Proc.of the 1st International Workshop on RFID Technology.Vienna,Austria:[s.n.],2007.
  • 5Osaka K,Takagi T,Yamazald K,et al.An Efficient and Secure RFID Security Method with Ownership Transfer[C]//Proc.of CIS'06.[S.l.]:Springer-Vedag,2007:778-787.
  • 6Lei Hong,CAO Tianjie.RFID Protocol Enabling Ownership Transfer to Protect Against Traceability and DoS Attacks[C]//Proc.of ISDPE'07.Chengdu,China:[s.n.],2007:508-510.
  • 7Bellovin S M,Merritt M.Encrypted Key Exchange:Password-based Protocols Secure Against Dictionary Attacks[C]//Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy.Oakland,USA:[s.n.],1992:72-84.
  • 8Li Yingjiu, Ding Xuhua. Protecting RFID communications in supply chains[C].Singapore:Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security-ASIACCS,2007:234-241.
  • 9Molnar D,Soppera A,Wagner D.A scalable,delegatable pseudonym protocol enabling ownership transfer of RFID tags[C].Selected Areas in Cryptography. Kingston: Springer-Verlag, 2005: 276-290.
  • 10Lim C H,Kwon T.Strong and robust RFID authentication enabling perfect ownership transfer[C]. Conference on Information and Communications Security.North Carolina:Springer-Verlag, 2006:1-20.

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部