可證明安全的輕量級RFID所有權(quán)轉(zhuǎn)移協(xié)議
doi: 10.11999/JEIT151049
-
1.
(徐州醫(yī)科大學(xué)醫(yī)學(xué)信息學(xué)院 徐州 221008) ②(中國礦業(yè)大學(xué)計算機科學(xué)與技術(shù)學(xué)院 徐州 221008)
國家自然科學(xué)基金(61303263),江蘇省第四期333高層次人才培養(yǎng)工程科研項目(BRA2014047),江蘇省六大人才高峰科研項目(2014-WLW-023)
Provable Secure for the Lightweight RFID Ownership Transfer Protocol
-
1.
(School of Medicine Information, Xuzhou Medical University, Xuzhou 221008, China)
-
2.
(College of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221008, China)
The National Natural Science Foundation of China (61303263), The 333 Project of Jiangsu Province (BRA2014047), The Six-top-talents High-level Talent Cultivation Project Research Funds of Jiangsu Province (2014-WLW-023)
-
摘要: 設(shè)計安全的無線射頻識別協(xié)議有助于實現(xiàn)智慧城市的規(guī)劃和構(gòu)建完善的智慧網(wǎng)絡(luò)。安全的RFID所有權(quán)轉(zhuǎn)移協(xié)議要求同時具備安全性和隱私性,標(biāo)簽的前向不可追蹤性和后向不可追蹤性是RFID系統(tǒng)實際應(yīng)用中需要考量的兩個重要的隱私性能。針對現(xiàn)有供應(yīng)鏈系統(tǒng)中所有權(quán)轉(zhuǎn)移協(xié)議存在的各種安全隱私問題,該文改進了原有前向不可追蹤性定義的錯過密鑰更新過程的不合理的假設(shè),提出了強前向不可追蹤性的概念。提出了一個基于二次剩余定理的輕量級RFID所有權(quán)轉(zhuǎn)移協(xié)議,并使用改進的模型和定義形式化證明了協(xié)議的安全性和隱私性。證明結(jié)果表明新方案既可以抵御內(nèi)部讀卡器惡意假冒攻擊,追蹤攻擊,標(biāo)簽假冒攻擊和異步攻擊,又滿足強前向不可追蹤性和后向不可追蹤性等隱私性能;新協(xié)議在實現(xiàn)低成本和高效率認證的基礎(chǔ)上,比其他協(xié)議安全性和隱私性更好。
-
關(guān)鍵詞:
- 無線射頻識別 /
- 所有權(quán)轉(zhuǎn)移協(xié)議 /
- 強前向不可追蹤性 /
- 后向不可追蹤性 /
- 二次剩余定理
Abstract: In order to implement the wisdom city planning and build perfect wisdom network, it is important to design the security Radio Frequency IDentification (RFID) protocol. A secure RFID ownership transfer protocol should be evaluated in terms of the security and privacy properties. In particular, there are two important privacy properties included forward untraceable and backward untraceable in the practical application of RFID system. In order to solve the various security and privacy problems, this paper enhances the unreasonable assumption that the attacker misses the key-update session in the definition of forward untraceable, then proposes the definition of strong forward untraceable. In addition, this paper designs the lightweight RFID ownership transfer protocol based on quadratic residues, and uses the enhanced model and definitions to formal prove the security and privacy properties. Moreover, the proof results not only show that the scheme resists against inner reader malicious im-personation attack, tracing attack, tag impersonation attack and desynchronization attack, but also formally prove that the proposed protocol meets strong forward untraceable and backward untraceable properties. In addition, the analysis results demonstrate that the protocol based on low-cost and high efficiency is superior to other protocols in the security and performance properties. -
CHEN Yalin, CHOU Juesam, and SUN Hungmin. A novel mutual authentication scheme based on quadratic residues for RFID systems[J]. Computer Networks, 2008, 52(12): 2373-2380. doi: 10.1016/j.comnet.2008.04.016. YEH Tzuchang, WU Chienhung, and TSENG Yuhmin. Improvement of the RFID authentication scheme based on quadratic residues[J]. Computer Communications, 2011, 34(3): 337-341. doi: 10.1016/j.comcom.2010.05.011. DOSS Robin, SUNDARESAN Saravanan, and ZHOU Wanlei. A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems[J]. Ad Hoc Networks, 2013, 11(1): 383-396. doi: 10.1016/j.adhoc. 2012.06.015. DOSS Robin and ZHOU Wanlei. A secure tag ownership transfer scheme in a closed loop RFID system[C]. Proceedings of the Wireless Communications and Networking Conference Workshops (WCNCW), Paris, 2012: 164-169. DOSS Robin, ZHOU Wanlei, and YU Shui. Secure RFID tag ownership transfer based on quadratic residues[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(2): 390-401. doi: 10.1109/TIFS.2012.2235834. 謝潤, 許春香, 陳文杰, 等. 一種具有閱讀器匿名功能的射頻識別認證協(xié)議[J]. 電子與信息學(xué)報, 2015, 37(5): 1241-1247. doi: 10.11999/JEIT140902. XIE Run, XU Chunxiang, CHEN Wenjie, et al. An RFID authentication protocol anonymous against readers[J]. Journal of Electronics Information Technology, 2015, 37(5): 1241-1247. doi: 10.11999/JEIT140902. 金永明, 孫惠平, 關(guān)志, 等. RFID 標(biāo)簽所有權(quán)轉(zhuǎn)移協(xié)議研究 [J]. 計算機研究與發(fā)展, 2011, 48(8): 1400-1405. JIN Yongming, SUN Huiping, GUAN Zhi, et al. Ownership transfer protocol for RFID tag[J]. Journal of Computer Research and Development, 2011, 48(8): 1400-1405. ALAGHEBAND Mahdi R and AREF Mohammad R. Simulation-based traceability analysis of RFID authentication protocols[J]. Wireless Personal Communications, 2014, 77(2): 1019-1038. doi: 10.1007/ s11277-013-1552-7. MORIYAMA Daisuke. Cryptanalysis and Improvement of A Provably Secure RFID Ownership Transfer Protocol[M]. Lightweight Cryptography for Security and Privacy, Springer Berlin Heidelberg, 2013: 114-129. doi: 10.1007/978-3-642- 40392-7_9. ELKHIYAOUI Kaoutar, BLASS Erik-Oliver, and MOLVA Refik. ROTIV: RFID Ownership Transfer with Issuer Verification[M]. RFID Security and Privacy, Springer Berlin Heidelberg, 2012: 163-182. doi: 10.1007/978-3-642-25286- 0_11. CHIEN Hungyu. Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices[J]. Computer Networks, 2013, 57(14): 2705-2717. doi: 10.1016/j.comnet.2013.06.005. VAN Deursen T. Security of RFID protocols[D]. [Ph.D. dissertation], University of Luxembourg, Luxembourg, 2011. 張輝, 侯朝煥, 王東輝. 一種基于部分ID的新型RFID安全隱私相互認證協(xié)議[J]. 電子與信息學(xué)報, 2009, 31(4): 853-856. ZHANG Hui, HOU Chaohuan, and WANG Donghui. A new security and privacy on RFID mutual authentication protocol based on partial ID[J]. Journal of Electronics Information Technology, 2009, 31(4): 853-856. LI Nan, MU Yi, SUSILOA Willy, et al. Shared RFID ownership transfer protocols[J]. Computer Standards Interfaces, 2015, 42: 95-104. doi: 10.1016/j.csi.2015.05.003. ZHANG Shigeng, LIU Xuan, WANG Jianxin, et al. Energy-efficient active tag searching in large scale RFID systems shigeng[J]. Information Sciences, 2015, 317: 143-156. doi: 10.1016/j.ins.2015.04.048. HSI Chengter, LIEN Yuanhung, CHIU Junghui, et al. Solving scalability problems on secure RFID grouping-proof protocol [J]. Wireless Personal Communications, 2015, 84(2): 1069-1088. doi: 10.1007/s11277-015-2676-8. AKGUN Mete and ?AGLAYAN M Ufuk. Providing destructive privacy and scalability in RFID systems using PUFs[J]. Ad Hoc Networks, 2015, 32: 32-42. doi: 10.1016/ j.adhoc.2015.02.001. ZHANG Daqiang, QIAN Yuming, WAN Jiafu, et al. An efficient RFID search protocol based on clouds[J]. Mobile Network Application, 2015, 20: 356-362. doi: 10.1007/ s11036-015-0597-0. VAUDENAY Serge. On Privacy Models for RFID[M]. Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2007, 4833: 68-87. doi: 10.1007/978-3-540- 76900-2_5. PHAN Raphael C W, WU Jiang, OUAFI Khaled, et al. Privacy analysis of forward and backward untraceable RFID authentication schemes[J]. Wireless Personal Communications, 2011, 61(1): 69-81. doi: 10.1007/s11277- 010-0001-0. NIU Haifeng, TAQIEDDIN Eyad, and JAGANNATHAN S. EPC gen2v2 RFID standard authentication and ownership management protocol[J]. IEEE Transactions on Mobile Computing, 2016, 15(1): 137-149. doi: 10.1109/TMC.2015. 2412933. -