期刊文献+

基于循转函数的RFID标签所有权转移协议

RFID tag ownership transfer protocol based on wheel function
下载PDF
导出
摘要 针对现有无线射频识别低成本无源标签在其生命周期中所有权不断转移的安全性问题,设计了一种新的基于循转函数的RFID标签所有权转移协议。在随机预言机模型下,定义标签所有权转移攻击模型、安全模型,利用攻击游戏证明协议的安全性。协议设计了完整三方认证过程,利用循转函数算法、交叉位运算以及二次剩余算法等加密通信数据并实现轻量级标准,而后新所有者和标签之间秘密信息的二次同步更新机制,保证了协议的前、后向隐私安全。最后给出多协议之间的标签计算量、通信量、存储量成本对比,表明协议满足安全、低成本特性。 Aiming at the security issues of the current wireless RFID low-cost passive tags whose ownership is continuously transferred during their life cycle,a new RFID tag ownership transfer protocol based on wheel function is designed.Under the random oracle model,this protocol defines the tag ownership transfer attack model and security model,and finally uses the game to prove the security of the protocol.The protocol designs a complete three-party authentication process,and uses encrypted functional data such as wheel function,cross-bit operation and quadratic residue algorithm to implement lightweight standards.Then,the secondary synchronization update mechanism of secret information between the new owner and tag ensures the forward and backward privacy of the protocol.At last,the comparison of the number of tags,traffic and storage cost between multi protocols shows that the protocol meets the security and low cost characteristics.
作者 丘洪伟 简碧园 QIU Hongwei;JIAN Biyuan(Department of Computer Science and Engineering,Guangzhou College of Technology and Business,Guangzhou 510850,China;School of Electronic and Computer Engineering,Guangzhou Vocational College of Science and Technology,Guangzhou 510550,China)
出处 《计算机工程与应用》 CSCD 北大核心 2018年第16期101-106,共6页 Computer Engineering and Applications
基金 广州市科技计划项目(No.201707010492) 广州工商学院2018年科研课题(No.KA201833)
关键词 无线射频识别(RFID) 低成本 所有权 转移 循转函数 随机预言机 攻击游戏证明 二次剩余 Radio Frequency Identification(RFID) low cost ownership transfer wheel function random oracle attackgame proof quadratic residue
  • 相关文献

参考文献11

二级参考文献116

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2Juels A, Weis S A. Authenticating pervasive devices with human protocols [G] //I.NCS 3621: Proc of Advances in Cryptology CRYPTO 2005. Berlin.. Springer, 2005:293-308.
  • 3Song B, Mitchell C J. REID authentication protocol for low cost tags [C] //Proc of ACM Conf on Wireless Network Security WiSec'08. New York: ACM, 2008:140-147.
  • 4Molnar D, Soppera A, Wagner D. A scalable, delegatable pseudonym protocol enabling ownership transfer of RF1D tags [G] //LNCS 3897: Proc of Selected Areas in Cryptography SAC 2005. Berlin: Springer, 2005: 276-290.
  • 5Saito J, Imamoto K, Sakurai K. Reassignment scheme of an RFID tags key for owner transfer [G]//LNCS 3823 : Proc of Embedded and Ubiquitous Computing EUC 2005 Workshoos. Berlin, SDrinuer, 2005, 1303-1312.
  • 6Osaka K, Takagi T, Yamazaki K, et al. An efficient and secure RFID security method with ownership transfer [G] // LNCS 4456: Proc of Computational Intelligence and Security CIS 2006. Berlin: Springer, 2006:778-787.
  • 7Fouladgar S, Afifi H. An efficient delegation and transfer of ownership protocol for RFID tags[C] //Proc of the 1st Int EURASIP Workshop on RFID Technology. Piseataway, NJ IEEE, 2007: 10-14.
  • 8Jappinen P, Hamalainen H. Enhanced RFID security method with ownership transfer [C]//Proc of 2008 Int Conf on Computational Intelligence and Security. Piseataway, NJ: IEEE, 2008: 382-385.
  • 9Song B. RFID tag ownership transfer [C/OL]/Proc of the Confon RFID Security. 2008. [2011-04-01]. http://event. iaik. tugraz, at/RFIDSecOS/Papers.
  • 10Kulseng L, Yu Zhen, Wei Yawen, et al. Lighteweight mutual authentication and ownership transfer for REID systems [C]//Proc of the 29th Conf on Computer Communications-IEEE INFOCOM 2010. Piscataway, NJ: IEEE, 2010: 1-5.

共引文献73

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部