网络与信息安全学报 ›› 2017, Vol. 3 ›› Issue (4): 14-19.doi: 10.11959/j.issn.2096-109x.2017.00120
修回日期:
2016-12-27
出版日期:
2017-04-01
发布日期:
2017-04-14
作者简介:
甘勇(1965-),男,湖南株洲人,博士,郑州轻工业学院教授、硕士生导师,主要研究方向为物联网安全。|杨宗琴(1993-),女,河南信阳人,郑州轻工业学院硕士生,主要研究方向为物联网安全。|贺蕾(1983-),男,河南三门峡人,郑州轻工业学院副教授、硕士生导师,主要研究方向为密码学、物联网安全。|杜超(1988-),男,河南濮阳人,郑州轻工业学院硕士生,主要研究方向为物联网安全。|刘思聪(1985-),男,河南郑州人,郑州轻工业学院硕士生,主要研究方向为物联网技术与安全。
基金资助:
Yong GAN(),Zong-qin YANG,Lei HE,Chao DU,Si-cong LIU
Revised:
2016-12-27
Online:
2017-04-01
Published:
2017-04-14
Supported by:
摘要:
采用拉格朗日插值算法,提出了一种带有不同权重的多所有者标签所有权动态转换协议。当标签所有权发生变化时,该协议能恢复出原有密钥,验证所有者的合法性,并使用秘密共享门限方案,根据所有者的新权重重新分发子密钥,提高了所有权转换的安全性和灵活性。对该协议进行了仿真实验,实验结果表明,该协议具有较低的计算量和较少的计算时间,适用于低成本的RFID标签。
中图分类号:
甘勇,杨宗琴,贺蕾,杜超,刘思聪. 带权重的多所有者标签所有权动态转换协议[J]. 网络与信息安全学报, 2017, 3(4): 14-19.
Yong GAN,Zong-qin YANG,Lei HE,Chao DU,Si-cong LIU. Tag dynamic ownership transfer protocol for multi-owner with weights[J]. Chinese Journal of Network and Information Security, 2017, 3(4): 14-19.
[12] | DIMITRIOU T , . RfidDOT:RFID delegation and ownership transfer made simple[C]// The International Conference on Security and Privacy in Communication Netowrks. 2008: 1-8. |
[13] | KULSENG L , YU Z , WEI Y ,et al. Lightweight mutual authentication and ownership transfer for RFID systems[C]// IEEE Infocom. 2010: 1-5. |
[14] | CHEN C L , HUANG Y C , JIANG J R . A secure ownership transfer protocol using EPCglobal Gen-2 RFID[J]. Telecommunication Systems, 2013,53(4): 387-399. |
[15] | CHEN C L , CHIEN C F . An ownership transfer scheme using mobile RFIDs[J]. Wireless Personal Communications an International Journal, 2013,68(3): 1093-1119. |
[16] | MUNILLA J , GUO F , SUSILO W . Cryptanalaysis of an EPCC1G2 standard compliant ownership transfer scheme[J]. Wireless Personal Communications, 2013,72(1): 245-258. |
[17] | ZUO Y , . Changing hands together:a secure group ownership transfer protocol for RFID tags[C]// Hawaii International Conference on System Sciences. 2010: 1-10. |
[18] | JANNATI H . Cryptanalysis and enhancement of a secure group ownership transfer protocol for RFID tags[J]. Lecture Notes of the Institute for Computer Sciences Social Informatics & Telecommunications Engineering, 2011(99): 186-193. |
[19] | DOSS R , ZHOU W , YU S . Secure RFID Tag ownership transfer based on quadratic residues[J]. IEEE Transactions on Information Forensics & Security, 2013,8(2): 390-401. |
[20] | YANG M H , HU H Y . Protocol for ownership transfer across authorities:with the ability to assign transfer target[J]. Security &Communication Networks, 2012,5(5): 164-177. |
[21] | SUNDARESAN S , DOSS R , ZHOU W . Secure ownership transfer in multi-tag/multi-owner passive RFID systems[C]// Global Communications Conference. 2013: 2891-2896. |
[22] | XIN W , GUAN Z , YANG T ,et al. An efficient privacy-preserving RFID ownership transfer protocol[M]// Web Technologies and Applications. Berlin:Springer, 2013: 538-549. |
[23] | SUNDARESAN S , DOSS R , ZHOU W ,et al. Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy[J]. Computer Communications, 2015,55: 112-124. |
[24] | 张学军, 王玉, 王锁萍 ,等. 基于循环移位的轻量型相互认证协议研究[J]. 电子学报, 2012,40(11): 2270-2275. |
ZHANG X J , WANG Y , WANG S P ,et al. Research on the cyclic shift lightweight mutual authentication protocol[J]. Acta Electronica Sinica, 2012,40(11): 2270-2275. | |
[1] | RAY B , CHOWDHURY M U , PHAM T . Mutual authentication with malware protection for a RFID system[C]// The International Conference on Advances in Distributed and Parallel Computing ADPC. 2010: 24-29. |
[2] | SONG B , MITCHELL C J . Scalable RFID security protocols supporting tag ownership transfer[J]. Computer Communications, 2011,34(4): 556-566. |
[25] | 贺蕾, 甘勇, 尹毅峰 ,等. 基于随机排列函数的 RFID 标签所有权转换协议[J]. 郑州大学学报:工学版, 2013,34(6): 24-27. |
HE L , GAN Y , YIN Y F ,et al. Ownership transfer protocol of RFID tags based on random permutation functions[J]. Journal of Zhengzhou University (Engineering Science), 2013,34(6): 24-27. | |
[3] | ERGULER I , ANARIM E . Security flaws in a recent RFID delegation protocol[J]. Personal & Ubiquitous Computing, 2012,16(3): 337-349. |
[4] | TRUJILLO-RASUA R , SOLANAS A , PéREZ-MARTíNEZ P A ,et al. Predictive protocol for the scalable identification of RFID tags through collaborative readers[J]. Computers in Industry, 2012,63(6): 557-573. |
[26] | 贺蕾, 甘勇, 尹毅峰 ,等. 一种 RFID 标签授权访问和所有权转换协议[J]. 合肥工业大学学报, 2014(2): 172-175. |
HE L , GAN Y , YIN Y F ,et al. A delegation and ownership transfer protocol of tag in RFID system[J]. Journal of Hefei University, 2014(2): 172-175. | |
[5] | IMRAN E , EMIN A , GOKAY S . A salient missing link in RFID security protocols[J]. Eurasip Journal on Wireless Communications& Networking, 2011(1): 5412-5483. |
[6] | 周永彬, 冯登国 . RFID 安全协议的设计与分析[J]. 计算机学报, 2006,29(4): 581-589. |
[27] | 甘勇, 李天豹, 贺蕾 ,等. 基于动态重载的 RFID 标签所有权转换协议研究[J]. 轻工学报, 2016,31(2): 97-102. |
GAN Y , LI T B , HE L ,et al. Study of RFID tag ownership transfer protocol based on dynamic overloading[J]. Journal of Light Industry, 2016,31(2): 97-102. | |
[6] | ZHOU Y B , FENG D G . Design and analysis of cryptographic protocols for RFID[J]. Chinese Journal of Computers, 2006,29(4): 581-589. |
[7] | OSAKA K , TAKAGI T , YAMAZAKI K ,et al. An efficient and secure RFID security method with ownership transfer[C]// Computational Intelligence and Security. 2006: 1090-1095. |
[28] | SHAMIR A , . How to share a secret[C]// Communications of the ACM. 1976: 612-613. |
[29] | BLAKLEY G R , . Safeguarding cryptographic keys[C]// The 1979 AFIPS National Computer Conference. 1979: 313-317. |
[8] | KAPOOR G , PIRAMUTHU S . Single RFID tag ownership transfer protocols[J]. IEEE Transactions on Systems Man & Cybernetics Part C Applications & Reviews, 2012,42(2): 164-173. |
[9] | FOULADGAR S , AFIFI H . A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags[J]. Journal of Communications, 2007,2(6): 6-13. |
[10] | J?PPINEN P , H?M?L?INEN H . Enhanced RFID security method with ownership transfer[C]// International Conference on Computational Intelligence and Security. 2008: 382-385. |
[11] | KAPOOR G , PIRAMUTHU S . Vulnerabilities in some recently proposed RFID ownership transfer protocols[J]. Communications Letters IEEE, 2010,14(14): 354-357. |
[1] | 陈先意, 顾军, 颜凯, 江栋, 许林峰, 付章杰. 针对车牌识别系统的双重对抗攻击[J]. 网络与信息安全学报, 2023, 9(3): 16-27. |
[2] | 叶天鹏, 林祥, 李建华, 张轩凯, 许力文. 面向雾计算的个性化轻量级分布式网络入侵检测系统[J]. 网络与信息安全学报, 2023, 9(3): 28-37. |
[3] | 祖立军, 曹雅琳, 门小骅, 吕智慧, 叶家炜, 李泓一, 张亮. 基于隐私风险评估的脱敏算法自适应方法[J]. 网络与信息安全学报, 2023, 9(3): 49-59. |
[4] | 夏锐琪, 李曼曼, 陈少真. 基于机器学习的分组密码结构识别[J]. 网络与信息安全学报, 2023, 9(3): 79-89. |
[5] | 袁静怡, 李子川, 彭国军. EN-Bypass:针对邮件代发提醒机制的安全评估方法[J]. 网络与信息安全学报, 2023, 9(3): 90-101. |
[6] | 余锋, 林庆新, 林晖, 汪晓丁. 基于生成对抗网络的隐私增强联邦学习方案[J]. 网络与信息安全学报, 2023, 9(3): 113-122. |
[7] | 朱春陶, 尹承禧, 张博林, 殷琪林, 卢伟. 基于多域时序特征挖掘的伪造人脸检测方法[J]. 网络与信息安全学报, 2023, 9(3): 123-134. |
[8] | 李晓萌, 郭玳豆, 卓训方, 姚恒, 秦川. 载体独立的抗屏摄信息膜叠加水印算法[J]. 网络与信息安全学报, 2023, 9(3): 135-149. |
[9] | 蔡召, 荆涛, 任爽. 以太坊钓鱼诈骗检测技术综述[J]. 网络与信息安全学报, 2023, 9(2): 21-32. |
[10] | 潘雁, 林伟, 祝跃飞. 渐进式的协议状态机主动推断方法[J]. 网络与信息安全学报, 2023, 9(2): 81-93. |
[11] | 杨盼, 康绯, 舒辉, 黄宇垚, 吕小少. 基于函数摘要的二进制程序污点分析优化方法[J]. 网络与信息安全学报, 2023, 9(2): 115-131. |
[12] | 肖天, 江智昊, 唐鹏, 黄征, 郭捷, 邱卫东. 基于深度强化学习的高性能导向性模糊测试方案[J]. 网络与信息安全学报, 2023, 9(2): 132-142. |
[13] | 袁承昊, 李勇, 任爽. 多关键词动态可搜索加密方案[J]. 网络与信息安全学报, 2023, 9(2): 143-153. |
[14] | 侯泽洲, 任炯炯, 陈少真. 基于神经网络区分器的SIMON-like算法参数安全性评估[J]. 网络与信息安全学报, 2023, 9(2): 154-163. |
[15] | 郭学镜, 方毅翔, 赵怡, 张天助, 曾文超, 王俊祥. 基于传统引导机制的深度鲁棒水印算法[J]. 网络与信息安全学报, 2023, 9(2): 175-183. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|