一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機號碼
標(biāo)題
留言內(nèi)容
驗證碼

可證明安全的輕量級RFID所有權(quán)轉(zhuǎn)移協(xié)議

陳秀清 曹天杰 翟靖軒

陳秀清, 曹天杰, 翟靖軒. 可證明安全的輕量級RFID所有權(quán)轉(zhuǎn)移協(xié)議[J]. 電子與信息學(xué)報, 2016, 38(8): 2091-2098. doi: 10.11999/JEIT151049
引用本文: 陳秀清, 曹天杰, 翟靖軒. 可證明安全的輕量級RFID所有權(quán)轉(zhuǎn)移協(xié)議[J]. 電子與信息學(xué)報, 2016, 38(8): 2091-2098. doi: 10.11999/JEIT151049
CHEN Xiuqing, CAO Tianjie, ZHAI Jingxuan. Provable Secure for the Lightweight RFID Ownership Transfer Protocol[J]. Journal of Electronics & Information Technology, 2016, 38(8): 2091-2098. doi: 10.11999/JEIT151049
Citation: CHEN Xiuqing, CAO Tianjie, ZHAI Jingxuan. Provable Secure for the Lightweight RFID Ownership Transfer Protocol[J]. Journal of Electronics & Information Technology, 2016, 38(8): 2091-2098. doi: 10.11999/JEIT151049

可證明安全的輕量級RFID所有權(quán)轉(zhuǎn)移協(xié)議

doi: 10.11999/JEIT151049
基金項目: 

國家自然科學(xué)基金(61303263),江蘇省第四期333高層次人才培養(yǎng)工程科研項目(BRA2014047),江蘇省六大人才高峰科研項目(2014-WLW-023)

Provable Secure for the Lightweight RFID Ownership Transfer Protocol

Funds: 

The National Natural Science Foundation of China (61303263), The 333 Project of Jiangsu Province (BRA2014047), The Six-top-talents High-level Talent Cultivation Project Research Funds of Jiangsu Province (2014-WLW-023)

  • 摘要: 設(shè)計安全的無線射頻識別協(xié)議有助于實現(xiàn)智慧城市的規(guī)劃和構(gòu)建完善的智慧網(wǎng)絡(luò)。安全的RFID所有權(quán)轉(zhuǎn)移協(xié)議要求同時具備安全性和隱私性,標(biāo)簽的前向不可追蹤性和后向不可追蹤性是RFID系統(tǒng)實際應(yīng)用中需要考量的兩個重要的隱私性能。針對現(xiàn)有供應(yīng)鏈系統(tǒng)中所有權(quán)轉(zhuǎn)移協(xié)議存在的各種安全隱私問題,該文改進了原有前向不可追蹤性定義的錯過密鑰更新過程的不合理的假設(shè),提出了強前向不可追蹤性的概念。提出了一個基于二次剩余定理的輕量級RFID所有權(quán)轉(zhuǎn)移協(xié)議,并使用改進的模型和定義形式化證明了協(xié)議的安全性和隱私性。證明結(jié)果表明新方案既可以抵御內(nèi)部讀卡器惡意假冒攻擊,追蹤攻擊,標(biāo)簽假冒攻擊和異步攻擊,又滿足強前向不可追蹤性和后向不可追蹤性等隱私性能;新協(xié)議在實現(xiàn)低成本和高效率認證的基礎(chǔ)上,比其他協(xié)議安全性和隱私性更好。
  • CHEN Yalin, CHOU Juesam, and SUN Hungmin. A novel mutual authentication scheme based on quadratic residues for RFID systems[J]. Computer Networks, 2008, 52(12): 2373-2380. doi: 10.1016/j.comnet.2008.04.016.
    YEH Tzuchang, WU Chienhung, and TSENG Yuhmin. Improvement of the RFID authentication scheme based on quadratic residues[J]. Computer Communications, 2011, 34(3): 337-341. doi: 10.1016/j.comcom.2010.05.011.
    DOSS Robin, SUNDARESAN Saravanan, and ZHOU Wanlei. A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems[J]. Ad Hoc Networks, 2013, 11(1): 383-396. doi: 10.1016/j.adhoc. 2012.06.015.
    DOSS Robin and ZHOU Wanlei. A secure tag ownership transfer scheme in a closed loop RFID system[C]. Proceedings of the Wireless Communications and Networking Conference Workshops (WCNCW), Paris, 2012: 164-169.
    DOSS Robin, ZHOU Wanlei, and YU Shui. Secure RFID tag ownership transfer based on quadratic residues[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(2): 390-401. doi: 10.1109/TIFS.2012.2235834.
    謝潤, 許春香, 陳文杰, 等. 一種具有閱讀器匿名功能的射頻識別認證協(xié)議[J]. 電子與信息學(xué)報, 2015, 37(5): 1241-1247. doi: 10.11999/JEIT140902.
    XIE Run, XU Chunxiang, CHEN Wenjie, et al. An RFID authentication protocol anonymous against readers[J]. Journal of Electronics Information Technology, 2015, 37(5): 1241-1247. doi: 10.11999/JEIT140902.
    金永明, 孫惠平, 關(guān)志, 等. RFID 標(biāo)簽所有權(quán)轉(zhuǎn)移協(xié)議研究 [J]. 計算機研究與發(fā)展, 2011, 48(8): 1400-1405.
    JIN Yongming, SUN Huiping, GUAN Zhi, et al. Ownership transfer protocol for RFID tag[J]. Journal of Computer Research and Development, 2011, 48(8): 1400-1405.
    ALAGHEBAND Mahdi R and AREF Mohammad R. Simulation-based traceability analysis of RFID authentication protocols[J]. Wireless Personal Communications, 2014, 77(2): 1019-1038. doi: 10.1007/ s11277-013-1552-7.
    MORIYAMA Daisuke. Cryptanalysis and Improvement of A Provably Secure RFID Ownership Transfer Protocol[M]. Lightweight Cryptography for Security and Privacy, Springer Berlin Heidelberg, 2013: 114-129. doi: 10.1007/978-3-642- 40392-7_9.
    ELKHIYAOUI Kaoutar, BLASS Erik-Oliver, and MOLVA Refik. ROTIV: RFID Ownership Transfer with Issuer Verification[M]. RFID Security and Privacy, Springer Berlin Heidelberg, 2012: 163-182. doi: 10.1007/978-3-642-25286- 0_11.
    CHIEN Hungyu. Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices[J]. Computer Networks, 2013, 57(14): 2705-2717. doi: 10.1016/j.comnet.2013.06.005.
    VAN Deursen T. Security of RFID protocols[D]. [Ph.D. dissertation], University of Luxembourg, Luxembourg, 2011.
    張輝, 侯朝煥, 王東輝. 一種基于部分ID的新型RFID安全隱私相互認證協(xié)議[J]. 電子與信息學(xué)報, 2009, 31(4): 853-856.
    ZHANG Hui, HOU Chaohuan, and WANG Donghui. A new security and privacy on RFID mutual authentication protocol based on partial ID[J]. Journal of Electronics Information Technology, 2009, 31(4): 853-856.
    LI Nan, MU Yi, SUSILOA Willy, et al. Shared RFID ownership transfer protocols[J]. Computer Standards Interfaces, 2015, 42: 95-104. doi: 10.1016/j.csi.2015.05.003.
    ZHANG Shigeng, LIU Xuan, WANG Jianxin, et al. Energy-efficient active tag searching in large scale RFID systems shigeng[J]. Information Sciences, 2015, 317: 143-156. doi: 10.1016/j.ins.2015.04.048.
    HSI Chengter, LIEN Yuanhung, CHIU Junghui, et al. Solving scalability problems on secure RFID grouping-proof protocol [J]. Wireless Personal Communications, 2015, 84(2): 1069-1088. doi: 10.1007/s11277-015-2676-8.
    AKGUN Mete and ?AGLAYAN M Ufuk. Providing destructive privacy and scalability in RFID systems using PUFs[J]. Ad Hoc Networks, 2015, 32: 32-42. doi: 10.1016/ j.adhoc.2015.02.001.
    ZHANG Daqiang, QIAN Yuming, WAN Jiafu, et al. An efficient RFID search protocol based on clouds[J]. Mobile Network Application, 2015, 20: 356-362. doi: 10.1007/ s11036-015-0597-0.
    VAUDENAY Serge. On Privacy Models for RFID[M]. Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2007, 4833: 68-87. doi: 10.1007/978-3-540- 76900-2_5.
    PHAN Raphael C W, WU Jiang, OUAFI Khaled, et al. Privacy analysis of forward and backward untraceable RFID authentication schemes[J]. Wireless Personal Communications, 2011, 61(1): 69-81. doi: 10.1007/s11277- 010-0001-0.
    NIU Haifeng, TAQIEDDIN Eyad, and JAGANNATHAN S. EPC gen2v2 RFID standard authentication and ownership management protocol[J]. IEEE Transactions on Mobile Computing, 2016, 15(1): 137-149. doi: 10.1109/TMC.2015. 2412933.
  • 加載中
計量
  • 文章訪問數(shù):  1154
  • HTML全文瀏覽量:  112
  • PDF下載量:  366
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2015-09-17
  • 修回日期:  2016-05-13
  • 刊出日期:  2016-08-19

目錄

    /

    返回文章
    返回