Computer Science ›› 2014, Vol. 41 ›› Issue (4): 134-138.

Previous Articles     Next Articles

Security RFID Authentication Scheme in Supply Chains

YANG Chao,ZHANG Hong-qi and QING Meng-yu   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Security RFID authentication scheme in supply chains should not only ensure the privacy and security of all the company,but also satisfy the requirement of supply chains management.Aiming at the problem that existing schemes can’t consider both sides at the same time,the paper proposed an authentication scheme based on “double signature”.The tag authentication message is signed by the access key and the authentication key.Only possessing both two keys can the company identify the tag.This scheme makes tags transfer safety inside the supply chains and makes the supply chains management convenient.Analysis shows that this scheme has clear advantage compared with existing schemes.

Key words: Supply chains management,Radio frequency identification,Double signature,Privacy protect

[1] 周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,9(4):581-589
[2] Gaukler G M,Seifert R W.Applications of RFID in SupplyChains[M]∥Trends in Supply Chain Design and Management:Technologies and Methodologies.London:Springer Verlag,2007:29-48
[3] Li Ying-jiu,Ding Xu-hua.Protecting RFID Commu- nication in Supply Chains[C]∥Proceeding of the 2nd ACM Symposium on Informatiom,Computer and Communications Security(ASIACCS’07).Singapore,2007:234-241
[4] 张帆,孙璇,马建峰,等.供应链环境下通用可组合安全的RFID通信协议[J].计算机学报,2008,1(10):1754-1767
[5] 邓淼磊,马建峰,周利华.RFID匿名认证协议的设计[J].通信学报,2009,30(7):20-26
[6] Lu L,Han J,Hu L,et al.Dynamic key-updating:privacy-preserving authentication for RFID systems[C]∥Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications.New York,USA,2007:13-22
[7] 马巧梅,王尚平.一个超轻量级的RFID认证协议[J].计算机工程,2012,38(2):151-158
[8] Fouladgar S,Afifi H.An efficient delegation and transfer ofownership protocol for RFID tags[C]∥1st International EURASIP Workshop on RFID Technology.Vienna,Austria,2007
[9] 陈志德,陈友勤,许力.RFID标签所有权转换安全协议[J].通信学报,2010,1(9A):202-208
[10] Song B,Mitchell C J.Scalable RFID security protocols suppor-ting tag ownership transfer[J].Computer Communications,2011(34):556-566
[11] Saito J,Imamoto K,Sakurai K.Reassignment scheme of anRFID tag’s key for owner transfer[C]∥Embedded and Ubi-quitouw Computing(EUC).Japan,2005:1303-1312
[12] van Deursen T,Radomirovic S.Security of an RFID Protocol for Supply Chains[C]∥Proceedings of the 1st Workshop on Advances in RFID,AIR’08.IEEE Computer Society,2008:568-573
[13] Osaka K,Takagi T,Yamazaki K,et al.An Efficient and Secure RFID Security Method with Ownership Transfer[J].Computational Intelligence and Security,2006,2(1):1090-1095
[14] Dimitriou T.RFIDDOT:RFID Delegation and OwnershipTransfer made simple[C]∥Proceedings of the 4th InternationalConference on Security and Privacy in Communication Networks.Istanbul,Turkey,2008:1-8

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!