期刊文献+

基于随机排列函数的RFID标签所有权转换协议 被引量:2

Ownership Transfer Protocol of RFID Tags Based on Random Permutation Functions
下载PDF
导出
摘要 针对RFID系统中标签在进行所有权转换时所遇到的安全问题,提出了一种基于随机排列函数的所有权转换协议.其中,随机排列函数在线性反馈移位寄存器和物理不可克隆函数的基础上进行构建.采用GNY逻辑对协议的安全性进行分析,该协议能够抵御重放攻击、中间人攻击和去同步化攻击,保护标签信息的前向安全和后向安全,并能提供不可跟踪性保护.在Linux中对该协议进行了仿真实现,获取了标签计算耗时等实验数据,并与其他研究成果进行了对比.结果表明:该协议中标签计算耗时较短,适用于低成本标签. This paper proposed a lightweight ownership transfer protocol based on random permutation func- tions to protect the ownership transfer procedure in RFID system. The random permutation functions were structured on the basis of linear feedback shift register and physical unclonable function. Our protocol analyzed its security by GNY logic. The result shows it can resist replay attack, man-in-middle attack and desynchroni- zation attack. It also provides forward security, backward security and untraceability. The protocol was simula- ted and implemented in Linux. We obtained experiment data including computation time cost by tag. Com- pared with other protocols, the experiment data shows that our protocol is suitable for low - cost tags because the computation time is shorter.
出处 《郑州大学学报(工学版)》 CAS 北大核心 2013年第6期24-27,共4页 Journal of Zhengzhou University(Engineering Science)
基金 国家自然科学基金资助项目(61272038) 河南省科技攻关计划项目(122102210124)
关键词 无线射频识别 所有权转换 线性反馈移位寄存器 物理不可克隆函数 GNY逻辑 radio frequency identification ownership transfer linear feedback shift register physical unclon- able function GNY logic
  • 相关文献

参考文献9

  • 1ZHOU Wei,YOON E J,PIRAMUTHU S.Varying levels of RFID tag ownership in supply chains[C]//On the Move to Meaningful Internet Systems:OTM 2011 Workshops.Berlin:Springer Berlin Heidelberg,2011:228-235.
  • 2JIA Han,WEN Jun.A novel RFID authentication protocol with ownership transfer[J].Lecture Notes in Electrical Engineering,2012,122:599-606.
  • 3SONG B.RFID tag ownership transfer[EB/OL].http://rfidsec2013.iaik.tugraz.at,2008-12-01.
  • 4WANG Shao-hui.Analysis and design of RFID tag ownership transfer protocol[C]//Proceedings of the 2011 International Conference on Informatics,Cybernetics,and Computer Engineering.Berlin:Springer Berlin Heidelberg,2012:229-236.
  • 5KAPOOR G,PIRAMUTHU S.Single RFID tag ownership transfer protocols[J].IEEE Transactions on,Systems,Man,and Cybernetics,Part C:Applications and Reviews.2012,42(2):164-173.
  • 6杨波.现代密码学[MM].北京:清华大学出版社,2010:15-19.
  • 7张紫楠,郭渊博.物理不可克隆函数综述[J].计算机应用,2012,32(11):3115-3120. 被引量:21
  • 8GONG Li,NEEDHAM R,YAHALOM R.Reasoning about belief in cryptographic protocols[C]//1990 IEEE Computer Society Symposium on Research in Security and Privacy.Washington D C:IEEE Computer Society,1990:234-248.
  • 9李建华,张爱新,薛质.网络安全协议的形式化分析与验证[M].北京:机械工业出版社,2010.

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2GASSEND B, CLARKE D, VANDIJK M, et al. Delay-based circuit authentication and applications[ C]// ACM Symposium on Applied Computing. New York: ACM, 2003:294 - 301.
  • 3PAPPU R S. Physical one-way functions[ D]. Boston: Massachusetts Institute of Technology, 2001.
  • 4LIM D, Extracting secret keys from integrated circuits[ D]. Boston: Massachusetts Institute of Technology, 2004.
  • 5LEE JW, LIM D, GASSEND B, et al. A technique to build a secret key in integrated circuits for identification and authentication application[ C] // Proceedings of the Symposium on VLSI Circuits. Washington, DC: IEEE Computer Society, 2004:176 - 159.
  • 6KUMAR S, GUAJARDO J, MAES R, et al. The butterfly PUF protecting IP on every FPGA[ C]//IEEE International Workshop on Hardware-oriented Security and Trust. Washington, DC: IEEE Computer Society, 2008 : 67 - 70.
  • 7OZTURK E, HAMMOURI G, SUNAR B. Towards robust low cost authentication for pervasive devices [ C ]// Proceedings of the Sixth IEEE International Conference on Pervasive Computing and Communication. Washington, DC: IEEE Computer Society, 2008:170 - 178.
  • 8SADEGHI A R, SCHULZ S, WACHSMANN C. Lightweight remote attestation using physical function[ C]// Conference on Wireless Network Security. New York: ACM, 2011 : 109 - 114.
  • 9TUYLS P. BATINA L. RFID-tags for anti-conterferting[ C]//Topics in Cryptology,2006, LNCS 3860. Bedim Springer, 2006:13 - 17.
  • 10BATINA L. GUAJARDO J. KERINS T, et al. Public-key cryptography for RFID-tags[ C]//Pervasive Computing and Communications Workshops. New York: ACM, 2007 : 217 - 222.

共引文献31

同被引文献13

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部