Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 369-372.

• Information Security • Previous Articles     Next Articles

New Ownership Transfer Protocol of RFID Tag

GAN Yong, WANG Kai, HE Lei   

  1. School of Computer and Communication Engineering,Zhengzhou University of Light Industry,Zhengzhou 450002,China
  • Online:2019-02-26 Published:2019-02-26

Abstract: There exists risk of security and privacy disclosure in the process of ownership transfer of RFID tag.Thus a new tag ownership transfer protocol with transfer switch based on Hash function was proposed .The original owner and the new owner have different communication keys respectively,the former key is used for authentication between the original owner and the tag while the latter key is for ownership transfer between the tag and the new owner.Because of the transfer switch,namely OTS,it is possible to implement OTS configuration to resist desynchronization attack through OTS configuration.The safety analysis of the protocol shows that the protocol can meet the safety requirements of tag ownership transfer and resist common active and passive attack,thus achieving complete transfer of tag ownership.Finally,theperformance of protocol was analyzed and the results show that efficiency performance of proposed protocol is significantly improved compared with existing ownership transfer protocol of RFID tag.

Key words: Authentication, Desynchronization attack, Hash function, Ownership transfer, Ownership transfer switch, Radio frequency identification(RFID)

CLC Number: 

  • TP393.04
[1]周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589.
[2]邵婧,陈越,常振华.RFID标签所有权转换模式及协议设计[J].计算机工程,2009,35(15):143-145.
[3]SAITO J,IMAMOTO K,SAKURAI K.Reassignment Scheme of an RFID Tag’s Key for Owner Transfer[M]∥LNCS 3823:Proceedings of Embedded and Ubiquitous Computing-EUC2005 Workshops.Berlin:Springer,2005:1303-1312.
[4]LIM C H,KWON T.Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer[M]∥Information and Communications Security.Springer Berlin Heidelberg,2006:1-20.
[5]OSAKA K,TAKAGI T,YAMAZAKI K,et al.An Efficient and Secure RFID Security Method with OwnershipTransfer[C]∥Proceedings of Computational Intelligence and Security-CIS 2006.Berlin:Springer,2006:778-787.
[6]LEI H,CAO T.RFID Protocol Enabling Ownership Transfer to Protect against Traceability and DoS Attacks[C]∥IEEE International Symposium on Data.Wuhan,China,2007:508-510.
[7]YOON E J,YOO K Y.Two security problems of RFID security method with ownership transfer[C]∥IFIP International Conference on Network and Parallel Computing.Washington D C:IEEE,2008:68-73.
[8]CHEN H B,LEE W B,ZHAO Y H,et al.Enhancement of the RFID security method with ownership transfer[C]∥Procee-dings of the 3rd International Conference on Ubiquitous Information Management and Communication.ACM,2009:251-254.
[9]JAPPINEN P,HAMALAINEN H.Enhanced RFID security method with ownership transfer[C]∥Proceedings of 2008 Interational Conference on Computational Intelligence and Security.Piscataway,NJ:IEEE,2008:382-385.
[10]SONG B.RFID tag ownership transfer[C]∥Proceedings Workshop on RFID Security.2008.
[11]SONG B,MITCHELL C J.RFID authentication protocol for low-cost tags[C]∥Proceedings of ACM Conference on Wireless Network Security-WiSec’08.New York:ACM,2008:140-147.
[12]DIMITRIOU T.rfidDOT:RFID delegation and ownership trans-fer made simple[C]∥International Conference on Security and Privacy in Communication Netowrks.ACM,2008:34.
[13]金永明,孙惠平,关志,等.RFID标签所有权转移协议研究[J].计算机研究与发展,2011,48(8):1400-1405.
[14]沈金伟,凌捷.一种改进的超轻量级RFID所有权转移协议[J].计算机科学,2014,41(12):125-128.
[15]苏庆,李倩,张俊源,等.基于共享密钥的超轻量RFID标签所有权转移协议[J/OL].[2017-02-27].http://kns.cnki.net/kcms/detail/11.2127.TP.20170227.1544.042.html.
[16]吴伟民,陈超雄,蓝炯江,等.基于Rabin加密算法的RFID标签所有权转移协议[J].计算机应用研究,2017,34(5):1531-1535.
[17]CAO T,CHEN X Q,ROBIN D,et al.RFID ownership transfer protocol based on cloud[J].Computer Networks,2016,105(32):47-59.
[1] JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313.
[2] CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543.
[3] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[4] WANG Xiang-yu, YANG Ting. Routing Directory Server Defined by Smart Contract [J]. Computer Science, 2021, 48(6A): 504-508.
[5] CAO Meng, YU Yang, LIANG Ying, SHI Hong-zhou. Key Technologies and Development Trends of Big Data Trade Based on Blockchain [J]. Computer Science, 2021, 48(11A): 184-190.
[6] LIAN Wen-juan, ZHAO Duo-duo, FAN Xiu-bin, GENG Yu-nian, FAN Xin-tong. CFL_BLP_BC Model Based on Authentication and Blockchain [J]. Computer Science, 2021, 48(11): 36-45.
[7] WU Yu-hong and HU Xiang-dong. Study on Security of Industrial Internet Network Transmission [J]. Computer Science, 2020, 47(6A): 360-363.
[8] MO Tian-qing and HE Yong-mei. SIP Authentication Key Agreement of Protocol Based on Certificateless [J]. Computer Science, 2020, 47(6A): 413-419.
[9] CHEN Meng-dong, GUO Dong-sheng, XIE Xiang-hui, WU Dong. Design and Implementation of Rule Processor Based on Heterogeneous Computing Platform [J]. Computer Science, 2020, 47(4): 312-317.
[10] ZHAO Nan,ZHANG Guo-an. Authenticated Privacy Protection Scheme Based on Certificateless Ring Signcryption in VANET [J]. Computer Science, 2020, 47(3): 312-319.
[11] LI Zhao-bin, CUI Zhao, WEI Zhan-zhen, ZHAO Hong, GUO Chao. Wireless Network Authentication Method Based on Physical Layer Channel Characteristics [J]. Computer Science, 2020, 47(12): 267-272.
[12] WANG Chun-dong, LUO Wan-wei, MO Xiu-liang, YANG Wen-jun. Survey on Mutual Trust Authentication and Secure Communication of Internet of Vehicles [J]. Computer Science, 2020, 47(11): 1-9.
[13] CHENG Qing-feng, LI Yu-ting, LI Xing-hua, JIANG Qi. Research on Application of Cryptography Technology for Edge Computing Environment [J]. Computer Science, 2020, 47(11): 10-18.
[14] YAO Mu-yan, TAO Dan. Implicit Authentication Mechanism of Pattern Unlock Based on Over-sampling and One-class Classification for Smartphones [J]. Computer Science, 2020, 47(11): 19-24.
[15] XIONG Ling, LI Fa-gen, LIU Zhi-cai. Conditional Privacy-preserving Authentication Scheme Based on Blockchain for Vehicular Ad Hoc Networks [J]. Computer Science, 2020, 47(11): 55-59.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!