期刊文献+

通用可组合安全的RFID标签组所有权转移协议 被引量:8

A Universally Composable Secure Group Ownership Transfer Protocol for RFID Tags
下载PDF
导出
摘要 在某些应用中,往往需要在一次会话中同时完成一组RFID标签所有权的转移.然而,现有的标签组所有权转移方案大多需要可信第三方的支持且存在诸多安全和隐私保护问题.在分析安全需求的基础上,设计了一个安全高效的RFID标签组所有权转移协议.该协议在无可信第三方支持的情况下实现了一组标签所有权的同时转移.在通用可组合框架下,定义了RFID标签组所有权转移的理想函数,并证明新协议实现了所定义的理想函数.与已有同类协议相比,新协议不仅具备匿名性、不可追踪性、授权访问、抗异步攻击、前向隐私保护、后向隐私保护等安全和隐私属性,还具有通用可组合安全性.在性能方面,新方案的计算复杂度相对较低,且交互次数和标签端存储量也较少. In some applications,it is often needed to simultaneously transfer the ownership of a group of RFID(radio frequency identification)tags in a session.However,most of the existing group ownership transfer schemes for RFID tags generally require the support of a trusted third party,and they often have many security and privacy protection issues.Based on the analysis of security requirements,a secure and efficient group ownership transfer protocol for RFID tags is designed.The new protocol supports simultaneous ownership transfer of a group of RFID tags without a trusted third party.Then,in the UC(universally composable)framework,an ideal functionality capturing the secure group ownership transfer for RFID tags is formally defined,and it is proved that the new protocol realizes the above defined ideal functionality.Compared with the existing group ownership transfer protocols for RFID tags,the new protocol provides the security and privacy properties such as anonymity,untraceability,mutual authentication,authorized access,resistance to de-synchronization attack,forward privacy protection and backward privacy protection.Meanwhile,it satisfies UC security.Furthermore,the new protocol has low computational complexity.In addition,the number of storage on the tag and the number of interaction among the entities are small.
出处 《计算机研究与发展》 EI CSCD 北大核心 2015年第10期2323-2331,共9页 Journal of Computer Research and Development
基金 教育部新世纪优秀人才支持计划基金项目(NCET-11-0565) 中央高校基本科研业务费专项资金项目(2012JBZ010) 教育部高校创新团队基金项目(IRT201206)
关键词 无线射频识别 通用可组合 所有权转移 协议 物联网 radio frequency identification(RFID) universally composable(UC) ownership transfer protocol Internet of things
  • 相关文献

参考文献20

  • 1Lim C H, Kwon T. Strong and robust RFID authentication enabling perfect ownership transfer [G] //LNCS 4307: Proc of the 8th Int Conf on Information and Communications Security. Berlin: Springer, 2006: 1-20.
  • 2Molnar D, Soppera A, Wagner D. A sealable, delegatable pseudonym protocol enabling ownership transfer of RFID tags [G] //LNCS 3897: Proc of the 12th Int Workshop on Selected Areas in Cryptography. Berlin: Springer, 2006: 276-290.
  • 3Kulseng L, Yu Z, Wei Y, et al. Lightweight mutual authentication and ownership transfer for RFID systems [C] //Proc of IEEE INFOCOM 2010. Piscataway, NJ: IEEE, 2010: 1-5.
  • 4金永明,孙惠平,关志,陈钟.RFID标签所有权转移协议研究[J].计算机研究与发展,2011,48(8):1400-1405. 被引量:33
  • 5Kapoor G, Piramuthu S. Single RFID tag ownership transfer protocols [J]. IEEE Trans on Systems, Man, and Cybernetics--Part C: Applications and Reviews, 2012, 42 (2) :164-173.
  • 6Canetti R. Universally composable security: A new paradigm for eryptographic protocols [C] //Proe of the 42nd IEEE Symp on Foundations of Computer Science. Los Alamitos, CA: IEEE Computer Society, 2001:136-145.
  • 7Song B. RFID tag ownership transfer [C/OL] //Proc of the Workshop on RFID Security. 2008 [2015-07-21]. http:// rfidsec2013, iaik. tugraz, at/RFIDSec08/Papers.
  • 8Rizomiliotis P, Rekleitis E. Security analysis of the Song-- Mitchell authentication protocol for low-cost RFID tags [J]. IEEE Communications Letters, 2009, 13(4): 274-276.
  • 9Peris-Lopez P, Hemandez-Castro J C, Tapiador J M E, et al. Vulnerability analysis of RFID protocols for tag ownership transfer [J]. Computer Networks, 2010, 54 (9) : 1502-1508.
  • 10Song B, Mitchell C J. Scalable RFID security protocols supporting tag ownership transfer [J]. Computer Communications, 2011, 34(4): 556-566.

二级参考文献71

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2International Telecommunication Union. ITU Internet Reports 2005: The Internet of Things, ITU, 2005.
  • 3van Deursen T, Mauw S, Radomirovic S. Untraceability of RFID protocols//Proceedings of the 2nd International Workshop on Information Security Theory and Practice. Seville, Spain, 2008:1-15.
  • 4Ha J, Moon S, Zhou J, Ha J. A new formal proof model for RFID location privacy//Proceedings of the 13th European Symposium on Research in Computer Security. Mddaga, Spain, 2008: 267-281.
  • 5van Deursen T, Radomirovic S. On a new formal proof model for RFID location privacy. Information Processing Letters, 2009, 110(2): 57-61.
  • 6Lim C H, Kwon T. Strong and robust RFID authentication enabling perfect ownership transfer//Proeeedings of the 8th International Conference on Information and Communications Security. Raleigh, NC, USA, 2006:1-20.
  • 7Le T V, Burmester M, de Medeiros B. Universally composable and forward-secure RFID authentication and authenticated key exehange//Proceedings of the 2007 ACM Symposium on InformAtion, Computer and Communications Security. Singapore, 2007:242-252.
  • 8Ouafi K, Phan R C W. Traceable privacy of recent provablysecure RFID Protocols//Proceedings of the 6th International Conference on Applied Cryptography and Network Security. New York, NY, USA, 2008:479-489.
  • 9Phan R C W, Wu J, Ouafi K, Stinson D R. Privacy analysis of forward and backward untraceable RFID authentication schemes. Wireless Personal Communications, Springer, Netherlands, 2010:1-13.
  • 10Song B, Mitchell C J. Scalable RFID security protocols supporting tag ownership transfer. Computer Communications, 2011, 34(4): 556-566.

共引文献76

同被引文献32

引证文献8

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部