期刊文献+

一种RFID标签授权访问和所有权转换协议 被引量:2

A delegation and ownership transfer protocol of tag in RFID system
下载PDF
导出
摘要 文章针对RFID系统中标签所有权转换过程中的安全问题,提出一种用于对标签进行授权访问和所有权转换的协议,采用GNY逻辑分析了该协议的安全性,比较了该协议的计算复杂度。分析结果表明:该协议具有良好的安全性,能够为通过认证的用户提供访问次数受限的授权,以及对标签的所有权进行转换;保护标签所有权转换过程中的前向安全和后向安全,能够抵御重放攻击、中间人攻击和去同步化攻击;与现有研究成果相比,该协议中标签的计算消耗较小,适用于低成本标签。 A delegation and ownership transfer protocol of tag is proposed to protect the process of ownership transfer of tag in radio frequency identification (RFID) system .The security of this proto-col is analyzed by using GNY logic and its computational complexity is compared with that of other protocols .The result indicates that the protocol has good security .It can provide limited delegation for authenticated users and ownership transfer of tag .It also provides forward and backward security during the procedure of ow nership transfer ,and resists replay attack ,man-in-middle attack and de-synchronization attack .Meanwhile ,the computation amount of tag in the protocol is less compared with some existing research results .It is suitable for low-cost RFID tag .
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2014年第2期172-175,214,共5页 Journal of Hefei University of Technology:Natural Science
基金 国家自然科学基金资助项目(61340059 61272038)
关键词 无线射频识别 授权 所有权转换 协议 GNY逻辑 RADIO FREQUENCY identification(RFID) delegation ownership transfer protocol GNY log-ic
  • 相关文献

参考文献10

  • 1Molnar D,Soppera A,Wagner D. A scalable,delegatable pseudonym protocol enabling ownership transfer of RFID tags[A].{H}Berlin:Springer-Verlag,2006.276-290.
  • 2Osaka K,Takagi T,Yamazaki K. An efficient and se-cure RFID security method with ownership transfer[A].Washington D C:IEEE,2006.1090-1095.
  • 3Jappinen P,Hamalainen H. Enhanced RFID security meth-od with ownership transfer[A].Washing-ton D C:IEEE Computer Society Press,2008.382-385.
  • 4Yoon E J,Yoo K Y. Two security problems of RFID securi-ty method with ownership transfer[A].Washington D C:IEEE,2008.68-73.
  • 5Kulseng L,Yu Z,Wei Y. Lightweight mutual authen-tication and ownership transfer for RFID systems[A].Washington D C:IEEE,2010.1-5.
  • 6Zhou W,Yoon E J,Piramuthu S. Varying levels of RFID tag ownership in supply chains[A].{H}Berlin:Springer-Verlag,2011.228-235.
  • 7Fernndez-Mir A,Trujillo-Rasua R,Castella-Roca J. A scalable RFID authentication protocol supporting owner-ship transfer and controlled delegation[J].{H}Lecture Notes in Computer Science,2012.147-162.
  • 8Jia H,Wen J. A novel RFID authentication protocol with ownership transfer[A].{H}Berlin:Springer-Verlag,2012.599-606.
  • 9Gong L,Needham R,Yahalom R. Reasoning about belief in cryptographic protocols[A].Washington D C:IEEE Computer Society,1990.234-248.
  • 10李建华;张爱新;薛质.网络安全协议的形式化分析与验证[M]{H}北京:机械工业出版社,201027-33.

同被引文献10

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部