浏览全部资源
扫码关注微信
北京交通大学 计算机与信息技术学院,北京100044
[ "原变青(1980-),女,山西祁县人,北京交通大学博士生,主要研究方向为安全协议、物联网安全等。" ]
[ "刘吉强(1973-),男,山东海阳人,北京交通大学教授、博士生导师,主要研究方向为可信计算、应用密码学、安全协议等。" ]
网络出版日期:2015-08,
纸质出版日期:2015-08-25
移动端阅览
原变青, 刘吉强. 可证明安全的RFID标签所有权转移协议[J]. 通信学报, 2015,36(8):83-90.
Bian-qing YUAN, Ji-qiang LIU. Provable secure ownership transfer protocol for RFID tag[J]. Journal on communications, 2015, 36(8): 83-90.
原变青, 刘吉强. 可证明安全的RFID标签所有权转移协议[J]. 通信学报, 2015,36(8):83-90. DOI: 10.11959/j.issn.1000-436x.2015228.
Bian-qing YUAN, Ji-qiang LIU. Provable secure ownership transfer protocol for RFID tag[J]. Journal on communications, 2015, 36(8): 83-90. DOI: 10.11959/j.issn.1000-436x.2015228.
随着物品所有权的转移,其上附着的RFID标签的所有权也需要转移。安全和隐私问题是标签所有权转移过程中需要研究的重点问题。在通用可组合框架下,形式化定义了RFID标签所有权转移的理想函数。提出了一个新的轻量级RFID标签所有权转移协议,并证明了该协议安全地实现了所定义的理想函数,即具有双向认证、标签匿名性、抗异步攻击、后向隐私保护和前向隐私保护等安全属性。与已有的RFID标签所有权转移协议相比,新协议中RFID标签的计算复杂度和存储空间需求都较低,并且与新旧所有者的交互较少,能够更加高效地实现低成本标签的所有权转移。
With the ownership transfer of an object
the ownership of the RFID tag attached to it also needs to be transferred.Security and privacy are the key issues while researchers studying the process of RFID tag ownership transfer.In the UC(universally composable)framework
an ideal functionality of RFID tag ownership transfer is formally defined.Then
a novel lightweight ownership transfer protocol for RFID tag is proposed.Subsequently
it is proved that proposed protocol realizes the previously defined ideal functionality and satisfies the required security properties such as mutual authentication
tag anonymity
resistance to de-synchronization attacks
forward privacy protection and backward privacy protection.Compared with the existing ownership transfer protocols for RFID tags
the computational complexity and the storage requirements of proposed protocol are all lower.Meanwhile
the number of interaction among the entities is small.Therefore
the proposed protocol can efficiently implement ownership transfer for low-cost tags.
LIM C H , KWON T . Strong and robust RFID authentication enabling perfect ownership transfer [A ] . 8th International Conference on Information and Communications Security [C ] . Raleigh,NC,USA , 2006 . 1 - 20 .
MOLNAR D , SOPPERA A , WAGNER D . A scalable,delegatable pseudonym protocol enabling ownership transfer of RFID tags [A ] . 12th International Workshop onSelected Areas in Cryptography [C ] . Kingston,Ont,Canada , 2006 . 276 - 290 .
OSAKA K , TAKAGI T , YAMAZAKI K , et al . An efficient and secure RFID security method with ownership transfer [A ] . Proceedings of IEEE 2006 International Conference on Computational Intelligence and Security [C ] . Guangzhou,China , 2006 . 1090 - 1095 .
FOULADGAR S , AFIFI H . An efficient delegation and transfer of ownership protocol for RFID tags [A ] . Proceedings of the 1st International EURASIP Workshop on RFID Technology [C ] . Vienna,Austria , 2007 . 68 - 93 .
SONG B . RFID tag ownership transfer [EB/OL ] . http://rfidsec2013.iaik.tugraz.at/RFIDSec08/Papers/ http://rfidsec2013.iaik.tugraz.at/RFIDSec08/Papers/ , 2008 .
RIZOMILIOTIS P , REKLEITIS E . Security analysis of the Song—Mitchell authentication protocol for low-cost RFID tags [J ] . IEEE Communications Letters , 2009 , 13 ( 4 ): 274 - 276 .
PERIS-LOPEZ P , HEMANDEZ-CASTRO J C , TAPIADOR J M E , et al . Vulnerability analysis of RFID protocols for tag ownership transfer [J ] . Computer Networks , 2010 , 54 ( 9 ): 1502 - 1508 .
SONG B , MITCHELL C J . Scalable RFID security protocols supporting tag ownership transfer [J ] . Computer Communications , 2011 , 34 ( 4 ): 556 - 566 .
金永明 , 孙惠平 , 关志等 . RFID标签所有权转移协议研究 [J ] . 计算机研究与发展 , 2011 , 48 ( 8 ): 1400 - 1405 .
JIN Y M , SUN H P , GUAN Z , et al . Ownership transfer protocol for RFID tag [J ] . Journal of Computer Research and Development , 2011 , 48 ( 8 ): 1400 - 1405 .
ELKHIYAOUI K , BLASS E O , MOLVA R . ROTIV:RFID ownership transfer with issuer verification [A ] . LNCS7055:7th International Workshop on RFID Security and Privacy [C ] . Berlin : Springer , 2012 . 163 - 182 .
MORIYAMA D . Cryptanalysis and improvement of a provably secure RFID ownership transfer protocol [A ] . LNCS8162:2nd International Workshop on Lightweight Cryptography for Security and Privacy [C ] . Berlin : Springer , 2013 . 114 - 129 .
KAPOOR G , PIRAMUTHU S . Single RFID tag ownership transfer protocols [J ] . IEEE Transactions on Systems,Man,and Cybernetics–part C:Applications and Reviews , 2012 , 42 ( 2 ): 164 - 173 .
DOSS R , ZHOU W , YU S . Secure RFID tag ownership transfer based on quadratic residues [J ] . IEEE Transactions on Information Forensics and Security , 2013 , 8 ( 2 ): 390 - 401 .
CHEN C L , HUAN Y C , JIANG J R . A secure ownership transfer protocol using EPC global Gen-2 RFID [J ] . Telecommunication Systems , 2013 , 53 ( 4 ): 387 - 399 .
周永彬 , 冯登国 . RFID 安全协议的设计与分析 [J ] . 计算机学报 , 2006 , 29 ( 4 ): 581 - 589 .
ZHOU Y B , FENG D G . Design and analysis of cryptographic protocols for RFID [J ] . Chinese Journal of Computers , 2006 , 29 ( 4 ): 581 - 589 .
邓淼磊 , 马建峰 , 周利华 . RFID 匿名认证协议的设计 [J ] . 通信学报 , 2009 , 30 ( 7 ): 20 - 26 .
DENG M L , MA J F , ZHOU L H . Design of anonymous authentication protocol for RFID [J ] . Journal on Communications , 2009 , 30 ( 7 ): 20 - 26 .
肖锋 , 周亚建 , 周景贤 , 等 . 标准模型下可证明安全的RFID双向认证协议 [J ] . 通信学报 , 2013 , 34 ( 4 ): 82 - 87 .
XIAO F , ZHOU Y J , ZHOU J X , et al . Provable secure mutual authentication protocol for RFID in the standard model [J ] . Journal on Communications , 2013 , 34 ( 4 ): 82 - 87 .
CANETTI R . Universally composable security:a new paradigm for cryptographic protocols [A ] . Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science [C ] . Las Vegas,Nevada,USA , 2001 . 136 - 145 .
张帆 , 孙璇 , 马建峰 , 等 . 供应链环境下通用可组合安全的 RFID 通信协议 [J ] . 计算机学报 , 2008 , 31 ( 10 ): 1754 - 1767 .
ZHANG F , SUN X , MA J F , et al . A universally compoable secure RFID communication protocol in supply chains [J ] . Chinese Journal of Computers , 2008 , 31 ( 10 ): 1754 - 1767 .
BURMESTER M , TRI V L , DE MEDEIROS B , et al . Universally composable RFID identification and authentication protocols [J ] . ACM Transactions on Information and System Security , 2009 , 12 ( 4 ): 1 - 33 .
BURMESTER M , MUNILLA J . Lightweight RFID authentication with forward and backward security [J ] . ACM Transactions on Information and System Security , 2011 , 14 ( 1 ): 11 .
张忠 , 徐秋亮 . 物联网环境下UC安全的组证明RFID协议 [J ] . 计算机学报 , 2011 , 34 ( 7 ): 1188 - 1194 .
ZHANG Z , XU Q L . Universally compoable grouping-proof protocol for RFID tags in the Internet of things [J ] . Chinese Journal of Computers , 2011 , 34 ( 7 ): 1188 - 1194 .
CANETTI R . Obtaining universally compoable security:towards the bare bones of trust [A ] . Proceedings of 13th International Conference on the Theory and Application of Cryptology and Informationsecurity [C ] . 2007 . 88 - 112 .
李凤华 , 冯涛 , 马建峰 . 基于 VSPH 的 UC 不经意传输协议 [J ] . 通信学报 , 2007 , 28 ( 7 ): 28 - 34 .
LI F H , FENG T , MA J F . Universally composable oblivious transfer protocol based on VSPH [J ] . Journal on Communications , 2007 , 28 ( 7 ): 28 - 34 .
张俊伟 , 马建峰 , 杨力 . UC安全的基于一次签名的广播认证 [J ] . 通信学报 , 2010 , 31 ( 5 ): 31 - 36 .
ZHANG J W , MA J F , YANG L . UC secure one-time signature based broadcast authentication [J ] . Journal on Communications , 2010 , 31 ( 5 ): 31 - 36 .
ZHANG J W , MA J F , MOON S J . Universally composable secure TNC model and EAP-TNC protocol in IF-T [J ] . Science China Information Sciences , 2010 , 53 ( 3 ): 465 - 482 .
张俊伟 , 马建峰 , 杨超 . 安全定位协议的 UC 模型 [J ] . 通信学报 , 2013 , 34 ( 2 ): 117 - 122 .
ZHANG J W , MA J F , YANG C . UC model of secure positioning protocols [J ] . Journal on Communications , 2013 , 34 ( 2 ): 117 - 122 .
0
浏览量
761
下载量
3
CSCD
关联资源
相关文章
相关作者
相关机构