计算机科学 ›› 2018, Vol. 45 ›› Issue (11A): 369-372.

• 信息安全 • 上一篇    下一篇

一种全新的RFID标签所有权转移协议

甘勇, 王凯, 贺蕾   

  1. 郑州轻工业学院计算机与通信工程学院 郑州450002
  • 出版日期:2019-02-26 发布日期:2019-02-26
  • 通讯作者: 王 凯(1993-),男,硕士生,主要研究方向为无线网络安全、RFID密码协议安全,E-mail:2403411494@qq.com
  • 作者简介:甘 勇(1965-),男,博士,教授,CCF会员,主要研究方向为分布式计算机系统、计算机网络、信息安全;贺 蕾(1980-),男,讲师,主要研究方向为无线网络安全、密码学、软件安全与保护。
  • 基金资助:
    本文受国家自然科学基金(61572445,61772477),河南省高等学校重点科研项目(16A520075)资助。

New Ownership Transfer Protocol of RFID Tag

GAN Yong, WANG Kai, HE Lei   

  1. School of Computer and Communication Engineering,Zhengzhou University of Light Industry,Zhengzhou 450002,China
  • Online:2019-02-26 Published:2019-02-26

摘要: RFID标签在所有权转移过程中面临安全和隐私泄露的风险。针对这一问题,提出了一种带有转移开关并基于Hash函数的新型标签所有权转移协议。原所有者和新所有者分别拥有不同的通信密钥,前者的密钥用于原所有者与标签之间的认证,后者的密钥用于标签与新所有者之间的所有权转移。由于存在转移开关(Ownership Transfer Switch,OTS),因此可以通过对OTS的设置来实现抵抗去同步化攻击。对该协议的安全性分析结果表明,该协议能够满足标签所有权转移的安全需要,并能抵抗常见的主被动攻击,使标签的所有权实现完全转移。最后对协议进行了性能分析,结果表明所提协议在效率性能方面比已有的RFID标签所有权转移协议有明显提高。

关键词: 哈希函数, 去同步化攻击, 认证, 所有权转移, 无线射频识别, 转移开关

Abstract: There exists risk of security and privacy disclosure in the process of ownership transfer of RFID tag.Thus a new tag ownership transfer protocol with transfer switch based on Hash function was proposed .The original owner and the new owner have different communication keys respectively,the former key is used for authentication between the original owner and the tag while the latter key is for ownership transfer between the tag and the new owner.Because of the transfer switch,namely OTS,it is possible to implement OTS configuration to resist desynchronization attack through OTS configuration.The safety analysis of the protocol shows that the protocol can meet the safety requirements of tag ownership transfer and resist common active and passive attack,thus achieving complete transfer of tag ownership.Finally,theperformance of protocol was analyzed and the results show that efficiency performance of proposed protocol is significantly improved compared with existing ownership transfer protocol of RFID tag.

Key words: Authentication, Desynchronization attack, Hash function, Ownership transfer, Ownership transfer switch, Radio frequency identification(RFID)

中图分类号: 

  • TP393.04
[1]周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589.
[2]邵婧,陈越,常振华.RFID标签所有权转换模式及协议设计[J].计算机工程,2009,35(15):143-145.
[3]SAITO J,IMAMOTO K,SAKURAI K.Reassignment Scheme of an RFID Tag’s Key for Owner Transfer[M]∥LNCS 3823:Proceedings of Embedded and Ubiquitous Computing-EUC2005 Workshops.Berlin:Springer,2005:1303-1312.
[4]LIM C H,KWON T.Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer[M]∥Information and Communications Security.Springer Berlin Heidelberg,2006:1-20.
[5]OSAKA K,TAKAGI T,YAMAZAKI K,et al.An Efficient and Secure RFID Security Method with OwnershipTransfer[C]∥Proceedings of Computational Intelligence and Security-CIS 2006.Berlin:Springer,2006:778-787.
[6]LEI H,CAO T.RFID Protocol Enabling Ownership Transfer to Protect against Traceability and DoS Attacks[C]∥IEEE International Symposium on Data.Wuhan,China,2007:508-510.
[7]YOON E J,YOO K Y.Two security problems of RFID security method with ownership transfer[C]∥IFIP International Conference on Network and Parallel Computing.Washington D C:IEEE,2008:68-73.
[8]CHEN H B,LEE W B,ZHAO Y H,et al.Enhancement of the RFID security method with ownership transfer[C]∥Procee-dings of the 3rd International Conference on Ubiquitous Information Management and Communication.ACM,2009:251-254.
[9]JAPPINEN P,HAMALAINEN H.Enhanced RFID security method with ownership transfer[C]∥Proceedings of 2008 Interational Conference on Computational Intelligence and Security.Piscataway,NJ:IEEE,2008:382-385.
[10]SONG B.RFID tag ownership transfer[C]∥Proceedings Workshop on RFID Security.2008.
[11]SONG B,MITCHELL C J.RFID authentication protocol for low-cost tags[C]∥Proceedings of ACM Conference on Wireless Network Security-WiSec’08.New York:ACM,2008:140-147.
[12]DIMITRIOU T.rfidDOT:RFID delegation and ownership trans-fer made simple[C]∥International Conference on Security and Privacy in Communication Netowrks.ACM,2008:34.
[13]金永明,孙惠平,关志,等.RFID标签所有权转移协议研究[J].计算机研究与发展,2011,48(8):1400-1405.
[14]沈金伟,凌捷.一种改进的超轻量级RFID所有权转移协议[J].计算机科学,2014,41(12):125-128.
[15]苏庆,李倩,张俊源,等.基于共享密钥的超轻量RFID标签所有权转移协议[J/OL].[2017-02-27].http://kns.cnki.net/kcms/detail/11.2127.TP.20170227.1544.042.html.
[16]吴伟民,陈超雄,蓝炯江,等.基于Rabin加密算法的RFID标签所有权转移协议[J].计算机应用研究,2017,34(5):1531-1535.
[17]CAO T,CHEN X Q,ROBIN D,et al.RFID ownership transfer protocol based on cloud[J].Computer Networks,2016,105(32):47-59.
[1] 蹇奇芮, 陈泽茂, 武晓康.
面向无人机通信的认证和密钥协商协议
Authentication and Key Agreement Protocol for UAV Communication
计算机科学, 2022, 49(8): 306-313. https://doi.org/10.11896/jsjkx.220200098
[2] 陈彦冰, 钟超然, 周超然, 薛凌妍, 黄海平.
基于医疗联盟链的跨域认证方案设计
Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain
计算机科学, 2022, 49(6A): 537-543. https://doi.org/10.11896/jsjkx.220200139
[3] 宋涛, 李秀华, 李辉, 文俊浩, 熊庆宇, 陈杰.
大数据时代下车联网安全加密认证技术研究综述
Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era
计算机科学, 2022, 49(4): 340-353. https://doi.org/10.11896/jsjkx.210400112
[4] 王向宇, 杨挺.
智能合约定义路由目录服务器
Routing Directory Server Defined by Smart Contract
计算机科学, 2021, 48(6A): 504-508. https://doi.org/10.11896/jsjkx.200700210
[5] 吴少乾, 李西明.
对抗网络上的可认证加密安全通信
Authenticable Encrypted Secure Communication Based on Adversarial Network
计算机科学, 2021, 48(5): 328-333. https://doi.org/10.11896/jsjkx.200300177
[6] 曹萌, 于洋, 梁英, 史红周.
基于区块链的大数据交易关键技术与发展趋势
Key Technologies and Development Trends of Big Data Trade Based on Blockchain
计算机科学, 2021, 48(11A): 184-190. https://doi.org/10.11896/jsjkx.210100163
[7] 廉文娟, 赵朵朵, 范修斌, 耿玉年, 范新桐.
基于认证及区块链的CFL_BLP_BC模型
CFL_BLP_BC Model Based on Authentication and Blockchain
计算机科学, 2021, 48(11): 36-45. https://doi.org/10.11896/jsjkx.201000002
[8] 倪亮, 王念平, 谷威力, 张茜, 刘伎昭, 单芳芳.
基于格的抗量子认证密钥协商协议研究综述
Research on Lattice-based Quantum-resistant Authenticated Key Agreement Protocols:A Survey
计算机科学, 2020, 47(9): 293-303. https://doi.org/10.11896/jsjkx.200400138
[9] 伍育红, 胡向东.
工业互联网网络传输安全问题研究
Study on Security of Industrial Internet Network Transmission
计算机科学, 2020, 47(6A): 360-363. https://doi.org/10.11896/JsJkx.191000114
[10] 莫天庆, 何咏梅.
一种基于无证书的SIP认证密钥协商协议
SIP Authentication Key Agreement of Protocol Based on Certificateless
计算机科学, 2020, 47(6A): 413-419. https://doi.org/10.11896/JsJkx.191100216
[11] 陈孟东, 郭东升, 谢向辉, 吴东.
基于异构计算平台的规则处理器的设计与实现
Design and Implementation of Rule Processor Based on Heterogeneous Computing Platform
计算机科学, 2020, 47(4): 312-317. https://doi.org/10.11896/jsjkx.190300104
[12] 赵楠,章国安.
VANET中基于无证书环签密的可认证隐私保护方案
Authenticated Privacy Protection Scheme Based on Certificateless Ring Signcryption in VANET
计算机科学, 2020, 47(3): 312-319. https://doi.org/10.11896/jsjkx.190100115
[13] 李兆斌, 崔钊, 魏占祯, 赵洪, 郭超.
基于物理层信道特征的无线网络认证机制
Wireless Network Authentication Method Based on Physical Layer Channel Characteristics
计算机科学, 2020, 47(12): 267-272. https://doi.org/10.11896/jsjkx.190900095
[14] 李艳斌, 刘瑜, 李木舟, 吴韧韬, 王鹏达.
MASCOT协议的参与方自适应变体
Participant-adaptive Variant of MASCOT
计算机科学, 2020, 47(11A): 380-387. https://doi.org/10.11896/jsjkx.200400091
[15] 秦艳琳, 吴晓平, 胡卫.
多重PKG环境中高效的身份基认证密钥协商协议
Efficient Identity-based Authenticated Key Agreement Protocol with Multiple Private Key Generators
计算机科学, 2020, 47(11): 68-72. https://doi.org/10.11896/jsjkx.191000008
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!