期刊文献+

一种支持密钥协商的标签所有权转换协议 被引量:2

Ownership Transfer Protocol Supporting Key Negotiation for RFID Tag
下载PDF
导出
摘要 针对标签在流通过程中的安全通信和所有权安全转换问题,提出了一种能提供密钥协商功能的标签所有权转换协议。通过将该协议分为认证与密钥协商和所有权转换与异常恢复两个阶段来实现相应的功能。采用GNY逻辑对协议的安全性进行了分析,结果表明该协议能够提供标签与所有者之间的双向认证和会话密钥协商,将标签的所有权安全地转换给新所有者,并能抵御中间人攻击、重放攻击和去同步化攻击等多种攻击手段。在Linux系统中实现了该协议,获取了标签计算耗时等运行指标。实验数据表明,标签的计算耗时较短,适用于低成本标签。 An ownership transfer protocol supporting key negotiation was proposed to provide secure communica- tion and ownership transfer during the circulation process of tags. The protocol is divided into authentication and key negotiation phase, ownership transfer and exception recovery phase. Security property of the protocol was ana- lyzed by GNY logic. The result indicates it provides mutual authentication and key negotiation between tags and owners. It securely transfers ownership of tag to new owner. The protocol resists man-in-middle attack, replay at- tack and desynchronization attack, etc. The protocol was implemented in Linux and obtained experimental data. It shows the computaeion time of tag is short. The protocol is suitable for low-cost tags.
出处 《科学技术与工程》 北大核心 2013年第28期8339-8343,8348,共6页 Science Technology and Engineering
基金 国家自然科学基金(61272038) 河南省科技攻关项目(122102210124) 河南省教育厅科学技术研究重点项目(12B520069 13A520363) 郑州轻工业学院校内科研基金资助
关键词 无线射频识别 双向认证 密钥协商 所有权转换 GNY RFID mutual authentication key negotiation ownership transfer GNY
  • 相关文献

参考文献16

  • 1Molnar D, Soppera A, Wagner D. A scalable, delegatable pseudo- nym protocol enabling ownership transfer of RFID tags//Selected Are- as in Cryptography. Berlin: Springer Berlin Heidelberg, 2006:276--290.
  • 2Song B. RFID tag ownership transfer, http://rfidsec2013, iaik. tugraz, at. 2008.
  • 3Song B, Mitchell C J. RFID authentication protocol for low-cost tags. Proceedings of the first ACM conference on Wireless network security. New York: ACM, 2008:140--147.
  • 4Kapoor G, Piramuthu S. Vulnerabilities in some recently proposed RFID ownership transfer protocols. First International Conference on Networks and Communications. Washington D C: IEEE, 2009: 354--357.
  • 5Shaohui W. Analysis and design of RFID tag ownership transfer proto- col. Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering. Berlin: Springer Berlin Heidelberg, 2012:229--236.
  • 6Jappinen, Hamilnen H. Enhanced RFID security method with own- ership transfer. International Conference on Computational Intelli- gence and Security. Washington D C : IEEE Computer Society Press, 2008, 382--385.
  • 7Dimitriou T. rfidDOT: RFID delegation and ownership transfer made simple. Proceedings of the 4th international conference on Security and privacy in communication netowrks. New York: ACM, 2008: 1--8.
  • 8Femtmdez-Mir A, Trujillo-Rasua R, Castella-Roca J, et al. A scala- ble RFID authentication protocol supporting ownership transfer and controlled delegation. RFID Security and Privacy. Berlin: Springer Berlin Heidelberg, 2012:147--162.
  • 9Chen C L, Chien C F. An ownership transfer scheme using mobile RFIDs. Wireless Personal Communications, 2013, 68 ( 3 ) : 1093--1119.
  • 10Kardas S, Arslan A, Celik S, et al. An efficient and private RFID authentication protocol supporting ownership transfer, http :// eprint, iacr. org/2011/667. 2011 : 12.

二级参考文献12

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2Juels A, Weis S A. Authenticating pervasive devices with human protocols [G] //I.NCS 3621: Proc of Advances in Cryptology CRYPTO 2005. Berlin.. Springer, 2005:293-308.
  • 3Song B, Mitchell C J. REID authentication protocol for low cost tags [C] //Proc of ACM Conf on Wireless Network Security WiSec'08. New York: ACM, 2008:140-147.
  • 4Molnar D, Soppera A, Wagner D. A scalable, delegatable pseudonym protocol enabling ownership transfer of RF1D tags [G] //LNCS 3897: Proc of Selected Areas in Cryptography SAC 2005. Berlin: Springer, 2005: 276-290.
  • 5Saito J, Imamoto K, Sakurai K. Reassignment scheme of an RFID tags key for owner transfer [G]//LNCS 3823 : Proc of Embedded and Ubiquitous Computing EUC 2005 Workshoos. Berlin, SDrinuer, 2005, 1303-1312.
  • 6Osaka K, Takagi T, Yamazaki K, et al. An efficient and secure RFID security method with ownership transfer [G] // LNCS 4456: Proc of Computational Intelligence and Security CIS 2006. Berlin: Springer, 2006:778-787.
  • 7Fouladgar S, Afifi H. An efficient delegation and transfer of ownership protocol for RFID tags[C] //Proc of the 1st Int EURASIP Workshop on RFID Technology. Piseataway, NJ IEEE, 2007: 10-14.
  • 8Jappinen P, Hamalainen H. Enhanced RFID security method with ownership transfer [C]//Proc of 2008 Int Conf on Computational Intelligence and Security. Piseataway, NJ: IEEE, 2008: 382-385.
  • 9Song B. RFID tag ownership transfer [C/OL]/Proc of the Confon RFID Security. 2008. [2011-04-01]. http://event. iaik. tugraz, at/RFIDSecOS/Papers.
  • 10Kulseng L, Yu Zhen, Wei Yawen, et al. Lighteweight mutual authentication and ownership transfer for REID systems [C]//Proc of the 29th Conf on Computer Communications-IEEE INFOCOM 2010. Piscataway, NJ: IEEE, 2010: 1-5.

共引文献32

同被引文献11

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部