期刊文献+

基于Rabin加密算法的RFID标签所有权转移协议 被引量:9

Ownership transfer protocol based on Rabin encryption algorithm for RFID tags
下载PDF
导出
摘要 针对在物联网应用中,RFID标签在其生命周期内会涉及到所有权转移的安全问题,提出了一种改进的基于Rabin加密算法的RFID标签所有权转移协议。改进的协议不依赖可信第三方,同时摈弃传统的基于hash函数加密方法,采用Rabin算法实现对信息的加密。采用挑战响应机制,利用Status标志位来标志标签当前所有权的归属,实现标签所有权的安全转移。分析结果表明,改进的协议不仅满足标签所有权转移的安全需求,而且克服了原协议中存在的暴力破解攻击安全缺陷问题,同时降低了标签的计算量,在安全性和效率方面较原所有权转移协议有较大提升。 In the application of Internet of things,the RFID tag in its life cycle will involve the issue of transfer of ownership,this paper put forward an improved Rabin encryption algorithm of RFID tag ownership transfer agreement. The improved protocol did not rely on the trusted third party,at the same time agreement instead of the traditional cryptographic hash function,it adopted Rabin algorithm to realize the information encryption. The challenge response mechanism,the use of the Status flags to signal the belonging of the ownership of a label the current implementation ownership transfer of security tag. The results show that the improved protocol not only meets the security requirements of tag ownership transfer,and overcomes the brute force attack safety defects existing in the original agreement,at the same time reduces the amount of calculation in the process of tag,in terms of safety and efficiency compared with the existing RFID tag ownership transfer agreement has large improvement.
出处 《计算机应用研究》 CSCD 北大核心 2017年第5期1531-1535,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61502108 61273118) 广东省重大科技专项资助项目(2014B010111007) 广东省自然科学基金资助项目(2016A030313702)
关键词 物联网 Rabin算法 射频识别 所有权转移协议 Internet of things Rabin algorithm RFID ownership transfer protocol
  • 相关文献

参考文献6

二级参考文献118

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170

共引文献347

同被引文献39

引证文献9

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部