期刊文献+

一种带有转换开关的RFID标签所有权转换协议

RFID Tag Ownership Transfer Protocol with Transfer Switch
下载PDF
导出
摘要 RFID标签在其生命周期内往往要经历多个所有者。为保护标签所有权转换过程中信息的安全性,提出了一种带有转换开关的所有权转换协议。在该协议中,标签和所有者共享两个密钥,分别用于进行认证通信和所有权转换。通过设置转换开关,达到允许所有权转换和抵御去同步化攻击的目的。采用GNY逻辑对协议进行了分析,分析结果表明,该协议能提供双向认证,抵御重放攻击、中间人攻击和去同步化攻击,并能保护标签信息的前向安全和后向安全。 A RFID tag typically experiences multiple owners in its lifetime. This paper proposes an ownership transfer protocol with transfer switch to protect the information security in the ownership transfer procedure. In the protocol,tags and owners share two keys which are respectively used for mutual authentication and ownership transfer,and ownership transfer switches are set to allow ownership transfer and resist desynchronization attacks. The protocol is analyzed in GNY logic,and the result indicates that it provides mutual authentication and resists replay attacks,man-in-middle attacks and desynchronization attacks,and it also protects forward security and backward security of the tag information.
机构地区 郑州轻工业学院
出处 《信息工程大学学报》 2014年第5期547-550,共4页 Journal of Information Engineering University
基金 国家自然科学基金资助项目(61340059 61272038)
关键词 双向认证 所有权转换 标签 无线射频识别 mutual authentication ownership transfer tag RFID
  • 相关文献

参考文献9

  • 1Osaka K, Takagi T, Yamazaki K, et al. An efficient and secure RFID security method with ownership transfer[ C ]//Computa- tional Intelligence and Security, 2006 International Conference on. 2006: 1090-1095.
  • 2Jappinen P, Hamalainen H. Enhanced RFID security method with ownership transfer[ C ]//Computational Intelligence and Se- curity, 2008. CIS08. International Conference on. 2008: 382-385.
  • 3Song B. RFID tag ownership transfer[ EB/OL]. [ 2008-05-14 ]. http ://rfidsec2013. iaik. tugraz, at/RFIDSecO8/Papers/Pub- lication/15 % 20-% 20Song% 20-% 20Ownership% 20Transfer% 20-% 20Paper. pdf.
  • 4Shaohui W. Analysis and Design of RFID Tag Ownership Transfer Protocol[ C ]//Proceedings of the 2011 International Confer- ence on Informatics, Cybernetics, and Computer Engineering ( ICCE2011 ). 2012 : 229-236.
  • 5Kulseng L, Yu Z, Wei Y, et al. Lightweight mutual authentication and ownership transfer for RFID systems[ C ]//INFOCOM, 2010 Proceedings IEEE. 2010: 1-5.
  • 6邵婧,陈越,甄鸿鹄.供应链环境下的RFID标签所有权转换方案[J].计算机工程与设计,2009,30(24):5618-5621. 被引量:11
  • 7邵婧,陈越,常振华.RFID标签所有权转换模式及协议设计[J].计算机工程,2009,35(15):143-145. 被引量:12
  • 8Li Gong, Roger Needham, Raphae Yahalom. Reasoning about belief in cryptographic protocols[ C ]//1990 IEEE Computer So- ciety Symposium on Research in Security and Privacy. 1990:234-248.
  • 9李建华,张爱新,薛质.网络安全协议的形式化分析与验证[M].北京:机械工业出版社,2010.

二级参考文献14

  • 1Molnar D,Soppera A,Wagner D.A Scalable,Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags[C]//Proc.of SAC'05.Kingston,Jamaica:Spdnger-Verlag,2005:276-290.
  • 2Lim C H,Kwnn T.Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer[C]//Proc.of ICICS'06.North Carolina,USA:Springer-Vedag,2006:1-20.
  • 3Fouladgar S,Afifi H.An Efficient Delegation and Transfer of Ownership Protocol for RDID Tags[C]//Proc.of the 1st International Workshop on RFID Technology.Vienna,Austria:[s.n.],2007.
  • 4Osaka K,Takagi T,Yamazald K,et al.An Efficient and Secure RFID Security Method with Ownership Transfer[C]//Proc.of CIS'06.[S.l.]:Springer-Vedag,2007:778-787.
  • 5Lei Hong,CAO Tianjie.RFID Protocol Enabling Ownership Transfer to Protect Against Traceability and DoS Attacks[C]//Proc.of ISDPE'07.Chengdu,China:[s.n.],2007:508-510.
  • 6Bellovin S M,Merritt M.Encrypted Key Exchange:Password-based Protocols Secure Against Dictionary Attacks[C]//Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy.Oakland,USA:[s.n.],1992:72-84.
  • 7Li Yingjiu, Ding Xuhua. Protecting RFID communications in supply chains[C].Singapore:Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security-ASIACCS,2007:234-241.
  • 8Molnar D,Soppera A,Wagner D.A scalable,delegatable pseudonym protocol enabling ownership transfer of RFID tags[C].Selected Areas in Cryptography. Kingston: Springer-Verlag, 2005: 276-290.
  • 9Lim C H,Kwon T.Strong and robust RFID authentication enabling perfect ownership transfer[C]. Conference on Information and Communications Security.North Carolina:Springer-Verlag, 2006:1-20.
  • 10Osaka K, Takagi T, Yamazaki K, et al.An efficient and secure RFID security method with ownership transfer[C].Computational Intelligence and Security. Springer-Verlag, 2006: 778-787.

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部