A novel authentication protocol enabling RFID tags ownership transfer

作者: Hong Wang , Xiaolong Yang , Qiong Huang , Keping Long , None

DOI: 10.1109/ICCT.2012.6511417

关键词:

摘要: Ownership of RFID tag may be frequently changed during its lifetime, thus how to securely transfer ownership between owners is very important. Recently, some lightweight cryptograph-based authentication protocols have been proposed resolve the problem, but most them assume that channel reader and database server secure, ignore backward un-traceability. Hence operations, there exist inevitably security/privacy vulnerabilities exposed malicious users previous owner. In this paper, we propose a novel protocol enabling tags transfer. Based on challenge-response mechanism, achieves mutual database. Moreover, it provides prevent fake reader. Also, based BAN logic give proof correctness. The merit our not only well protects owner's privacy also high-security high-efficiency.

参考文章(9)
Shingo Kinoshita, Miyako Ohkubo, Koutarou Suzuki, Cryptographic Approach to “Privacy-Friendly” Tags ,(2003)
Albert Fernàndez-Mir, Rolando Trujillo-Rasua, Jordi Castellà-Roca, Josep Domingo-Ferrer, A scalable RFID authentication protocol supporting ownership transfer and controlled delegation international conference on rfid. pp. 147- 162 ,(2011) , 10.1007/978-3-642-25286-0_10
Gildas Avoine, Etienne Dysli, Philippe Oechslin, Reducing time complexity in RFID systems international conference on selected areas in cryptography. ,vol. 3897, pp. 291- 306 ,(2005) , 10.1007/11693383_20
Norbert Pramstaller, Christian Rechberger, Vincent Rijmen, A compact FPGA implementation of the hash function whirlpool field programmable gate arrays. pp. 159- 166 ,(2006) , 10.1145/1117201.1117225
Michael Burrows, Martin Abadi, Roger Needham, A logic of authentication ACM Transactions on Computer Systems. ,vol. 8, pp. 18- 36 ,(1990) , 10.1145/77648.77649
Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi, An Efficient and Secure RFID Security Method with Ownership Transfer computational intelligence and security. ,vol. 2, pp. 778- 787 ,(2006) , 10.1007/978-3-540-74377-4_81
Hong Lei, Tianjie Cao, A Structural Complexity Metric for Software Components international symposium on data privacy and e commerce. pp. 161- 163 ,(2007) , 10.1109/ISDPE.2007.29
Boyeon Song, Chris J. Mitchell, Scalable RFID security protocols supporting tag ownership transfer Computer Communications. ,vol. 34, pp. 556- 566 ,(2011) , 10.1016/J.COMCOM.2010.02.027
Pekka Jäppinen, Harri Hämäläinen, Enhanced RFID Security Method with Ownership Transfer computational intelligence and security. ,vol. 2, pp. 382- 385 ,(2008) , 10.1109/CIS.2008.26