期刊文献+

带有TTP权重的多所有者标签所有权转换协议研究

RFID Tag Ownership Transfer Protocol of Multi-owner with Different Weights and TTP
下载PDF
导出
摘要 针对多所有者RFID标签所有权转换问题,提出了一种带有TTP权重的多所有者标签所有权转换协议。所有权的变化不仅是由标签的所有者发生变化引起,同时不同的所有者所占有权重发生变化也会导致所有权的变化。由于可信第三方参与所有权的转换,使得原所有者可完全地将对标签的所有权转交给新所有者,该协议具备原所有者无关性。使用GNY逻辑对该协议进行了安全性分析,并进行了仿真实验。结果表明:该协议能抵抗转换过程中的多种攻击,同时标签耗时较低。 With regard to the multi-owner RFID tags ownership transfer,a multi-owner RFID tags ownership transfer protocol based on TTP weights was put forward.Not only will the change in the owner of the tag result in the change in ownership,but the change in the weights of different owners will result in the change in ownership.Because there is a trusted third party involved in the conversion of ownership,the original owner completely transfers the tag's ownership to the new owner,that is to say,the protocol original owner shall be irrelevant.Security analysis is conducted with GNY logic,and simulation experiments are carried out on the protocol.The result shows that it can resist all kinds of attacks in the process of conversion;meanwhile,the tags take less time.
机构地区 郑州轻工业学院
出处 《中原工学院学报》 CAS 2017年第6期80-85,共6页 Journal of Zhongyuan University of Technology
关键词 RFID标签 所有权转换 可信第三方 原所有者无关性 GNY逻辑 RFID tag ownership transfer trusted third party independence of old owner GNY logic
  • 相关文献

参考文献4

二级参考文献86

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170

共引文献158

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部