Computer Science ›› 2014, Vol. 41 ›› Issue (4): 116-119.

Previous Articles     Next Articles

Design and Analysis of Secure Anti-collision Search Protocol for RFID

CAO Zheng,YANG Lin and XIE Hui   

  • Online:2018-11-14 Published:2018-11-14

Abstract: According to the particularity of search protocol for RFID,its security requirements were extended in this paper.Then,on the basis of the extended security requirements,some security enhancements and improvements on the original SSP protocol were achieved,and a secure anti-collision search protocol for RFID called SSP+protocol was proposed.Subsequently,based on security analysis of SSP+protocol,it was proved that this improved protocol can not only provide general security requirements,such as privacy protection,anonymity,untraceability,but also eliminate security risk caused by collision,thereby meeting anti-collision that is the unique security requirement on search protocol.

Key words: Radio frequency identification (RFID),Search protocol,Security,Anti-collision

[1] 孙其博,刘杰,黎羴,等.物联网:概念、架构与关键技术研究综述[J].北京邮电大学学报,2010,33(3):1-9
[2] 卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752
[3] Tan C C,Sheng B,Li Q.Serverless search and authentication protocols for RFID[C]∥5th IEEE International Conference on Pervasive Computing and Communications.New York:IEEE Press,2007:24-29
[4] Ahamed S,Rahman F,Hoque E,et al.S3PR:secure serverless search protocols for RFID[C]∥International Conference on Information Security and Assurance.Hawaii:IEEE Press,2008:187-192
[5] Kulseng L,Yu Z,Wei Y.Lightweight secure search protocols forlow-cost RFID systems[C]∥29th International Conference on Distributed Computing Systems.Washington:IEEE Press,2009:40-48
[6] 邓淼磊,衡晓鹏,鲁志波.安全的RFID搜索协议[J].西安通信学院学报,2009,8(5):78-81
[7] 曹峥,邓淼磊.通用可组合的RFID搜索协议[J].华中科技大学学报:自然科学版,2011,39(4):56-59
[8] van Le T,Burmester M,Medeiros B.Universally composableand forward secure RFID authentication and authenticated key exchange[C]∥Proc.of the 2nd ACM Symposium on Information,Computer and Communications Security.New York:ACM,2007:242-252
[9] Burmester M,van Le T,Medeiros B.Provably secure ubiquitous systems:Universally composable RFID authentication protocols[C]∥Proc.of the 2nd International Conference on Security and Privacy in Networks.Maryland:IEEE Press,2006:176-186
[10] 邓淼磊,马建峰,周利华,等.RFID匿名认证协议的设计[J].通信学报,2009,30(7):24-31
[11] Lee S M,Hwang Y J,Lee D H.Efficient authentication for low-cost RFID systems[C]∥Proc.of the International Conference on Computational Science and Its Applications (ICCSA2005).Berlin:Springer-Verlag,2005:619-627
[12] Canetti R.Universally composable security:a new paradigm for cryptographic protocols[C]∥42th IEEE Annual Symposium on Foundations of Computer Science.Oakland:IEEE Press,2001:136-145
[13] Kurosawa K,Furukawa J.Universally composable undeniablesignature[C]∥Proc.of ICALP’08.Berlin:Springer-Verlag,2008:524-535
[14] Canetti R,Herzog J.Universally composable symbolic analysis of mutual authentication and key-exchange protocols[C]∥Theo-ry of Cryptography Conference.Berlin:Springer-Verlag,2006:380-403

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!