Computer Science ›› 2014, Vol. 41 ›› Issue (12): 125-128.doi: 10.11896/j.issn.1002-137X.2014.12.026

Previous Articles     Next Articles

Improved Ultra-lightweight Authentication of Ownership Transfer Protocol for RFID Tag

SHEN Jin-wei and LING Jie   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Aiming at the securing hole of current ownership transfer protocol,a ultra-lightweight RFID mutual aut- hentication of ownership transfer protocol was proposed.The formal proof of the proposed authentication protocol was given based on GNY logic.It improves the reader and the tag in an open environment confidentiality of communications,which not only solves problems of Denial of Service (DoS) that are produced when the attacker replays the message,but also achieves the reader and the tag mutual authentication function through changing protocols interact.This paper analyzed the security and compared the performance of the protocol.The results show that the proposed protocol not only satisfies the security requirements of transfer of ownership,but also has the characteristics of ultra-lightweight,which indicates that it is suitable for actual mobile authentication environment.

Key words: RFID,DoS attack,Ultra-lightweigh,Ownership transfer protocol,GNY logic

[1] 邵婧,陈越,常振华.RFID标签所有权转换模式及协议设计[J].计算机工程,2009,35(15):143-145
[2] Molnar D,Soppera A,Wagner D.A Scalable,Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags[C]∥Proc.of SAC’05.Kingston,Jamaica:Springer-Verlag,2005:276-290
[3] Osaka K,Takagi T,Yamazaki K,et al.An Efficient and Secure RFID Security Method with Ownership Transfer[C]∥Proc.of CIS’06.Springer-Verlag,2006:778-787
[4] Fouladgar S,Afifi H.An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags[C]∥Proc.of the 1st International Workshop on RFID Technology.Vienna,Austria,2007
[5] Kulseng L,Yu Zhen,Wei Ya-wen,et al.Lightweight mutual authentication and ownership transfer for RFID systems [C]∥Proc of the 29th Conf on Computer Communications IEEE INFOCOM 2010.Piscataway,NJ:IEEE,2010:1-5
[6] 金永明,孙惠平,关志,等.RFID标签所有权转移协议研究[J].计算机研究与发展,2011,48(8):1400-1405
[7] Fernandez-Mir A,Trujillo-Rasua R,Castella-Roca J,et al.AScalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation.RFID,Security and Privacy,LNCS,2012,7055:147-162
[8] Doss R,Zhou Wan-lei,Yu Shui.Secure RFID Tag Ownership Transfer Based on Quadratic Residues[J].IEEE Transcations on information forensics and security,2013,8(2):390-401
[9] 彭朋,赵一鸣,韩伟力,等.一种超轻量级的RFID双向认证协议[J].计算机工程,2011,37(16):140-142
[10] Shamir A.SQUASH-A new MAC with provable security properties for constrained devices such as RFID tags [C]∥LNCS 5086:Proc of 15th Annual Fast Software Encryption Workshop.Springer,2008:144-157
[11] 李杰.RFID安全认证协议研究与设计[D].西安:西安电子科技大学,2012:40-46

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!