期刊文献+

一种适用于标签组的所有权转移协议 被引量:1

Ownership Transfer Protocol for RFID Tags
下载PDF
导出
摘要 在实际应用中,经常会遇到一次通话需转移多个标签的所有权问题,现有的绝大多数所有权转移协议只适用于单标签所有权的转移,为解决该问题,设计出一种适用于多标签的所有权转移协议.所提协议无需依赖可信第三方,从而可以减少系统中的通信实体数;协议基于中国剩余定理及交叉位运算对传输消息进行加密,确保通信消息的安全可靠;在一次通话过程中,协议能够同时转移多个标签的所有权.基于BAN逻辑形式化给出数学证明过程,并对协议进行安全性及性能分析,表明协议具备所有权转移所需的安全性及较低的计算量. In practical applications, the ownership problem of multiple tags is often encountered in one call. Most of the existing ownership transfer protocols are applicable only to the transfer of single label ownership. In order to solve the problem, a multi label transfer protocol is designed. The proposed protocol can reduce the number of communication entities in the system without relying on trusted third parties. The protocol encrypts the transmission message based on the Chinese Remainder Theorem and word Cro operation to ensure the safety and reliability of communication messages. In the process of one call, the protocol can transfer the ownership of multiple labels simultaneously. Based on the logic formalization of BAN, the mathematical proof process is given, and the security and performance of the protocol are analyzed. It shows that the protocol has the security and low computation needed for the transfer of ownership.
作者 于仕 付萍萍 卓明旺 李彬 江虹 YU Shi1, FU Ping-Ping1, ZHUO Ming-Wang2, LI Bin1, JIANG Hong1(1.Information Communication Branch, State Grid Jiangxi Electric Power Co. Ltd., Nanchang 330077, China;2.Information System Integration Company, Nari Group Corporation, Nanjing 211106, China)
出处 《计算机系统应用》 2018年第11期259-264,共6页 Computer Systems & Applications
关键词 无线射频识别 所有权转移 群组标签 交叉位运算 RFID ownership transfer the group of tags Cro operation
  • 相关文献

参考文献9

二级参考文献97

  • 1王信,薛小平,张思东.RFID系统数据安全研究[J].信息技术与信息化,2006(1):51-53. 被引量:11
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:209
  • 3杨波.现代密码学[M].2版.北京:清华大学出版社,2007.
  • 4LAURIE A. Practical attacks against RFID[ J]. Network Security, 2007(9) :4-7.
  • 5YUKIYASU T,TERUO S,TOMOYASU S,et al. Cryptanalysis of DES implemented on computers with cache [ C ]//Proc of the 5 th Interna- tional Workshop on Cryptographic Hardware and Embedded Systems. [ S. 1. ] :Springer-Verlag,2003:62-76.
  • 6SARMA S,WEIS S,ENGELS D. RFID systems, security and privacy implications, MIT-AUTOID-WH-014 [ R ]. [ S. 1. ] : Auto-ID Center, MIT, 2002.
  • 7JUELS A, RIVEST R L, SZYDLO M. The blocker tag : selective bloc- king of RFID tags for consumer privacy [ C ]//Proc of ACM Confe- rence on Computer and Communications Security. 2003 : 103-111.
  • 8GARFINKEL S L,JUELS A,PAPPU R. RFID privacy: an overview of problems and proposed solutions [ J]. IEEE Security & Privacy Magazine ,2005,3 ( 3 ) :34-44.
  • 9JUELS A. RFID security and privacy: a research survey[ J]. IEEE Journal on Selected Areas in Communications, 2004,24 ( 2 ) : 381-394.
  • 10KIRN H S,OH J H, CHOI J Y. Analysis of the RFID security proto- col for secure smart home network [ C ]//Proc of lntenmtional Confe- rence on Hybrid Information Technology. 2006:356-363.

共引文献121

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部