[1]贺蕾,甘勇,尹毅峰,等.基于随机排列函数的RFID标签所有权转换协议[J].郑州大学学报(工学版),2013,34(06):24-27.[doi:10.3969/j.issn.1671-6833.2013.06.006]
 HELei,GAN Yong,YIN Yi-feng,et al.OwnershipTransferProtocol of RFIDTags Based onRandomPermutationFunctions[J].Journal of Zhengzhou University (Engineering Science),2013,34(06):24-27.[doi:10.3969/j.issn.1671-6833.2013.06.006]
点击复制

基于随机排列函数的RFID标签所有权转换协议()
分享到:

《郑州大学学报(工学版)》[ISSN:1671-6833/CN:41-1339/T]

卷:
34
期数:
2013年06期
页码:
24-27
栏目:
出版日期:
2013-12-30

文章信息/Info

Title:
OwnershipTransferProtocol of RFIDTags Based onRandomPermutationFunctions
作者:
贺蕾甘勇尹毅峰等.
郑州轻工业学院计算机与通信工程学院,河南郑州,450002, 郑州轻工业学院计算机与通信工程学院,河南郑州,450002, 郑州轻工业学院计算机与通信工程学院,河南郑州,450002, 郑州轻工业学院计算机与通信工程学院,河南郑州,450002
Author(s):
HELeiGAN YongYIN Yi-fengJIN Song·he
School ofComputer and Communication Engineering,Zhengzhou University of LightIndustry,Zhengzhou450002,China
关键词:
无线射频识别 所有权转换 线性反馈移位寄存器 物理不可克隆函数 GNY逻辑
Keywords:
radio frequencyidentificationownershiptransferlinear feedback shift registerphysical unclonablefunctionGNY logic
分类号:
TP393
DOI:
10.3969/j.issn.1671-6833.2013.06.006
文献标志码:
A
摘要:
针对RFID系统中标签在进行所有权转换时所遇到的安全问题,提出了一种基于随机排列函数的所有权转换协议,其中,随机排列函数在线性反馈移位寄存器和物理不可克隆函数的基础上进行构建,采用GNY逻辑对协议的安全性进行分析,该协议能够抵御重放攻击、中间人攻击和去同步化攻击,保护标签信息的前向安全和后向安全,并能提供不可跟踪性保护,在Linux中对该协议进行了仿真实现,获取了标签计算耗时等实验数据,并与其他研究成果进行了对比,结果表明:该协议中标签计算耗时较短,适用于低成本标签.
Abstract:
This paper proposed a lightweight ownership transfer protocol based on random permutation func— tions to protect the ownership transfer procedure in RFID system.The random permutation functions were structured onthe basisof linear feedback shift registerandphysical unclonablefunction.Ourprotocol analyzed its security byGNYlogic.The result showsit can resist replay attack,man-in-middleattackand desynchronization attack.Italso provides forward security,backwardsecurity and untraceability.Theprotocol wassimulated andimplemented in Linux.We obtained experiment data including computation time cost by tag.Compared with otherprotocols,the experiment data showsthat our protocol is suitable for low—cost tags because the computation time is shorter.

参考文献/References:

[1]ZHOU Wei,YOON E J,PIRAMUTHU s. Varyinglevels of RFID tag ownership in supply chains [ C]77On the Move to Meaningful Internet Systems:OTM2011 Workshops. Berlin : Springer Berlin Heidelberg,2011 :228 - 235.

[2]JIA Han,WEN Jun. A novel RFID authentication pro-tocol with ownership transfer[ J]. Lecture Notes in E-lectrical Engineering ,2012,122:599- 606.
[3]SONG B. RFID tag ownership transfer[ EB/OL]. ht-tp :/ / rfidsec2013. iaik . tugraz. at,2008 - 12 -01.

更新日期/Last Update: 1900-01-01