期刊文献+

满足后向安全的RFID标签组所有权转移协议 被引量:1

RFID Tag Group Ownership Transfer Protocol Satisfying Backward Security
下载PDF
导出
摘要 多数标签所有权转移协议只适用于单个标签的所有权转移,无法实现标签组一次转移。为此,提出一种基于可信第三方的无线射频识别标签组所有权转移协议。在确保新旧所有者与标签进行双向认证基础上,通信消息利用交叉位运算、字合成运算进行加密。在通信消息加密过程中混入随机数,使前后2次通信消息有区别,增大破解难度。可信第三方的参与,使新所有者与标签直接同步更新密钥,不通过原所有者,保证协议的后向安全性。性能分析结果表明,该协议具有较高的安全性和较低的成本。 Most of tag ownership transfer protocols are only applicable to the single tag ownership transfer,and are not suitable for the tag group transfer at one time.To solve this problem,a Radio Frequency Identification(RFID) tag group ownership transfer protocol based on trusted third party is proposed.Based on ensuring the bidirectional authentication between the new and old owners and the tags,the communication messages are encrypted by the cross-bit operation and the word synthesis operation.In the process of encrypting the communication messages,the random numbers are mixed,so that the front-to-back communication messages are different,and the crack is increasingly difficult.Based on the participation of trusted third party,without the original owner,the new owner can update the private key directly with the tag to ensure the backward security of the protocol.Performance analysis results show that this protocol has higher security and lower cost.
作者 魏访 邹志革 WEI Fang;ZOU Zhige(School of Electronic Information Engineering,Wuhan Polytechnic,Wuhan 430074,China;School of Optical and Electronic Information,Huazhong University of Science and Technology,Wuhan 430074,China)
出处 《计算机工程》 CAS CSCD 北大核心 2019年第4期136-141,共6页 Computer Engineering
基金 湖北省教育厅科学技术研究计划指导性项目"基于机器视觉的激光标刻系统的研究"(B201658)
关键词 无线射频识别 所有权转移 后向安全 标签组 位运算 暴力破解 Radio Frequency Identification(RFID) ownership transfer backward security tag group bit operation brute force crack
  • 相关文献

参考文献5

二级参考文献62

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2李凤华,冯涛,马建峰.基于VSPH的UC不经意传输协议[J].通信学报,2007,28(7):28-34. 被引量:8
  • 3Li T L, Jin Z G, Pang C Y. Secured ownership transfer scheme for low-cost RFID tags [C] //Proc of the 3rd Interna- tional Conference on Intelligent Networks and Intelligent Sys- tems, 2010: 584-587.
  • 4Song B, Chris J Mitchell. Scalable RFID security protocols supporting tag ownership transfer [J]. Computer Communica- tions, 2011, 34 (4): 556-566.
  • 5Chen C L, Chien C F. An ownership transfer scheme using mobile RFIDs [J]. Wireless Personal Communications, 2013, 68 (3): 1093-1119.
  • 6Ching Y N, Susilo W, YI M Practical RFID ownership transfer scheme [J]. Journal of Computer Sma'ity, 2011, 19 (2): 319-341.
  • 7Yang M H, Hu H Y. Protocol for ownership transfer across authorities: With the ability to assign transfer target [J]. Se- curity and Communication Networks, 2012, 5 (2): 164-177.
  • 8Hoque M E, Raham F, Ahamed S I. Enhancing privacy andsecurity of RFID system with serverless authentication and search protocols in pervasive environments [J]. Wireless Per- sonal Cornmunications, 2010, 55 (1): 65-79.
  • 9Zou Y J. Chaging hands together: A .secure group ownership transfer protocol for RFID tags [C] //Proc of the 43rd Hawaii International Conference on System Sciences, 2010: 1-10.
  • 10Kapoor G, Zhou Wei, Piramuthu S. Multi-tag and mul- tiowner RFID ownership transfer in supply chains [J]. Deci- sion Support Systems, 2011, 52 (1): 258-270.

共引文献67

同被引文献17

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部