GAN Yong, LI Tian-bao, HE Lei and et al. Research on ownership transfer protocols of RFID tags based on dynamic overload[J]. Journal of Light Industry, 2016, 31(2): 97-102. doi: 10.3969/j.issn.2096-1553.2016.2.013
Citation:
GAN Yong, LI Tian-bao, HE Lei and et al. Research on ownership transfer protocols of RFID tags based on dynamic overload[J]. Journal of Light Industry, 2016, 31(2): 97-102.
doi:
10.3969/j.issn.2096-1553.2016.2.013
Research on ownership transfer protocols of RFID tags based on dynamic overload
-
College of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou 450001, China
-
Received Date:
2015-05-19
Available Online:
2016-03-15
-
Abstract
Aiming at security and privacy issues existing in the process of authentication and authorization of RFID tags ownership transfer, combining with the principles of Class-Programming and overload, a RFID tag ownership transfer protocol based on dynamic overload was presented.It improved iterative mechanism of pseudo-random sequence generator on the basis of an PUF component, utilized self-compiling extension factor generated by chips to enhance randomness of output, constructed lightweight set of candidate functions for both communication sides so as to achieve dynamic execution of algorithms in ownership transfer process which via the overload principle in Object-Oriented programming.The security and computing cost of protocol analysis results showed that the new protocol provided tag with secure ownership transfer on the basis of authentication efficiency and authorization, and it had higher security and lower computation cost compared with similar protocols.
-
-
References
-
[1]
OSAKA K,TAKAGI T,YAMAZAKI K,et al.An efficient and secure RFID security method with ownership transfer[C]//Proceedings of CIS 2006 International Conference, Heidelberg:Springer,2007:778.
-
[2]
KULSENG L,YU Z,WEI Y W,et al.Lightweight mutual authentication and ownership transfer for RFID systems[C]//Proceedings of the 29th Conference on Computer Communications,Piscataway:IEEE,2010:1.
-
[3]
SONG B,MITCHELL C J.Scalable RFID security protocols supporting tag ownership transfer[J].Computer communications,2011,34(4):556.
-
[4]
KAPOOR G,PIRAMUTHU S.Vulnerabilities in some recently proposed RFID ownership transfer protocols[J].IEEE communications letters,2010,14(3):260.
-
[5]
RAY B R,CHOWDHURY M,ABAWAJY J.Secure mobile RFID ownership transfer protocol to cover all transfer scenarios[C]//Proceedings of 20127th International Conference on Computing and Convergence Technology(ICCCT),Piscataway:IEEE,2012:1185.
-
[6]
张学军,王玉,王锁萍,等.基于循环移位的轻量型相互认证协议研究[J].电子学报,2012,40(11):2270.
-
[7]
GAN Y,HE L,LI N N,et al.An improved forward secure RFID privacy protection scheme[C]//Proceedings of 20102nd International Asia Conference on Informatics in Control,Automation and Robotics(CAR),Piscataway:IEEE,2010:273.
-
[8]
张素智,王朝辉,孙培锋.基于动态更新ID的RFID安全认证协议研究[J].郑州轻工业学院学报,2011,26(6):1.
-
Proportional views
-
-