JOURNAL OF LIGHT INDUSTRY

CN 41-1437/TS  ISSN 2096-1553

Volume 31 Issue 2
March 2016
Article Contents
GAN Yong, LI Tian-bao, HE Lei and et al. Research on ownership transfer protocols of RFID tags based on dynamic overload[J]. Journal of Light Industry, 2016, 31(2): 97-102. doi: 10.3969/j.issn.2096-1553.2016.2.013
Citation: GAN Yong, LI Tian-bao, HE Lei and et al. Research on ownership transfer protocols of RFID tags based on dynamic overload[J]. Journal of Light Industry, 2016, 31(2): 97-102. doi: 10.3969/j.issn.2096-1553.2016.2.013 shu

Research on ownership transfer protocols of RFID tags based on dynamic overload

  • Received Date: 2015-05-19
    Available Online: 2016-03-15
  • Aiming at security and privacy issues existing in the process of authentication and authorization of RFID tags ownership transfer, combining with the principles of Class-Programming and overload, a RFID tag ownership transfer protocol based on dynamic overload was presented.It improved iterative mechanism of pseudo-random sequence generator on the basis of an PUF component, utilized self-compiling extension factor generated by chips to enhance randomness of output, constructed lightweight set of candidate functions for both communication sides so as to achieve dynamic execution of algorithms in ownership transfer process which via the overload principle in Object-Oriented programming.The security and computing cost of protocol analysis results showed that the new protocol provided tag with secure ownership transfer on the basis of authentication efficiency and authorization, and it had higher security and lower computation cost compared with similar protocols.
  • 加载中
    1. [1]

      OSAKA K,TAKAGI T,YAMAZAKI K,et al.An efficient and secure RFID security method with ownership transfer[C]//Proceedings of CIS 2006 International Conference, Heidelberg:Springer,2007:778.

    2. [2]

      KULSENG L,YU Z,WEI Y W,et al.Lightweight mutual authentication and ownership transfer for RFID systems[C]//Proceedings of the 29th Conference on Computer Communications,Piscataway:IEEE,2010:1.

    3. [3]

      SONG B,MITCHELL C J.Scalable RFID security protocols supporting tag ownership transfer[J].Computer communications,2011,34(4):556.

    4. [4]

      KAPOOR G,PIRAMUTHU S.Vulnerabilities in some recently proposed RFID ownership transfer protocols[J].IEEE communications letters,2010,14(3):260.

    5. [5]

      RAY B R,CHOWDHURY M,ABAWAJY J.Secure mobile RFID ownership transfer protocol to cover all transfer scenarios[C]//Proceedings of 20127th International Conference on Computing and Convergence Technology(ICCCT),Piscataway:IEEE,2012:1185.

    6. [6]

      张学军,王玉,王锁萍,等.基于循环移位的轻量型相互认证协议研究[J].电子学报,2012,40(11):2270.

    7. [7]

      GAN Y,HE L,LI N N,et al.An improved forward secure RFID privacy protection scheme[C]//Proceedings of 20102nd International Asia Conference on Informatics in Control,Automation and Robotics(CAR),Piscataway:IEEE,2010:273.

    8. [8]

      张素智,王朝辉,孙培锋.基于动态更新ID的RFID安全认证协议研究[J].郑州轻工业学院学报,2011,26(6):1.

Article Metrics

Article views(1066) PDF downloads(59) Cited by()

Ralated
    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return