计算机科学 ›› 2014, Vol. 41 ›› Issue (4): 134-138.

• 信息安全 • 上一篇    下一篇

供应链环境下安全的RFID认证方案

杨超,张红旗,卿梦雨   

  1. 解放军信息工程大学 郑州450004;解放军信息工程大学 郑州450004;中国人民解放军68202部队 天水741000
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家863计划项目(2009AAZ438),国家973计划项目(2011CB311801)资助

Security RFID Authentication Scheme in Supply Chains

YANG Chao,ZHANG Hong-qi and QING Meng-yu   

  • Online:2018-11-14 Published:2018-11-14

摘要: 供应链环境下RFID安全认证方案不仅要保证各节点的隐私安全,还应该满足供应链管理需求。针对现有方案存在不能同时兼顾两者的不足,提出一种基于“双重签名”的认证方案。标签的认证信息先后采用访问密钥和认证密钥进行双重签名生成,只有同时具备这两个密钥才能识别标签身份。该方案既可以实现标签在供应链内的安全传递,又能方便供应链的管理。分析表明,该方案较现有方案优势明显。

关键词: 供应链管理,射频识别,双重签名,隐私保护

Abstract: Security RFID authentication scheme in supply chains should not only ensure the privacy and security of all the company,but also satisfy the requirement of supply chains management.Aiming at the problem that existing schemes can’t consider both sides at the same time,the paper proposed an authentication scheme based on “double signature”.The tag authentication message is signed by the access key and the authentication key.Only possessing both two keys can the company identify the tag.This scheme makes tags transfer safety inside the supply chains and makes the supply chains management convenient.Analysis shows that this scheme has clear advantage compared with existing schemes.

Key words: Supply chains management,Radio frequency identification,Double signature,Privacy protect

[1] 周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,9(4):581-589
[2] Gaukler G M,Seifert R W.Applications of RFID in SupplyChains[M]∥Trends in Supply Chain Design and Management:Technologies and Methodologies.London:Springer Verlag,2007:29-48
[3] Li Ying-jiu,Ding Xu-hua.Protecting RFID Commu- nication in Supply Chains[C]∥Proceeding of the 2nd ACM Symposium on Informatiom,Computer and Communications Security(ASIACCS’07).Singapore,2007:234-241
[4] 张帆,孙璇,马建峰,等.供应链环境下通用可组合安全的RFID通信协议[J].计算机学报,2008,1(10):1754-1767
[5] 邓淼磊,马建峰,周利华.RFID匿名认证协议的设计[J].通信学报,2009,30(7):20-26
[6] Lu L,Han J,Hu L,et al.Dynamic key-updating:privacy-preserving authentication for RFID systems[C]∥Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications.New York,USA,2007:13-22
[7] 马巧梅,王尚平.一个超轻量级的RFID认证协议[J].计算机工程,2012,38(2):151-158
[8] Fouladgar S,Afifi H.An efficient delegation and transfer ofownership protocol for RFID tags[C]∥1st International EURASIP Workshop on RFID Technology.Vienna,Austria,2007
[9] 陈志德,陈友勤,许力.RFID标签所有权转换安全协议[J].通信学报,2010,1(9A):202-208
[10] Song B,Mitchell C J.Scalable RFID security protocols suppor-ting tag ownership transfer[J].Computer Communications,2011(34):556-566
[11] Saito J,Imamoto K,Sakurai K.Reassignment scheme of anRFID tag’s key for owner transfer[C]∥Embedded and Ubi-quitouw Computing(EUC).Japan,2005:1303-1312
[12] van Deursen T,Radomirovic S.Security of an RFID Protocol for Supply Chains[C]∥Proceedings of the 1st Workshop on Advances in RFID,AIR’08.IEEE Computer Society,2008:568-573
[13] Osaka K,Takagi T,Yamazaki K,et al.An Efficient and Secure RFID Security Method with Ownership Transfer[J].Computational Intelligence and Security,2006,2(1):1090-1095
[14] Dimitriou T.RFIDDOT:RFID Delegation and OwnershipTransfer made simple[C]∥Proceedings of the 4th InternationalConference on Security and Privacy in Communication Networks.Istanbul,Turkey,2008:1-8

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!