Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (4): 14-19.doi: 10.11959/j.issn.2096-109x.2017.00120
• Papers • Previous Articles Next Articles
Yong GAN(),Zong-qin YANG,Lei HE,Chao DU,Si-cong LIU
Revised:
2016-12-27
Online:
2017-04-01
Published:
2017-04-14
Supported by:
CLC Number:
Yong GAN,Zong-qin YANG,Lei HE,Chao DU,Si-cong LIU. Tag dynamic ownership transfer protocol for multi-owner with weights[J]. Chinese Journal of Network and Information Security, 2017, 3(4): 14-19.
[12] | DIMITRIOU T , . RfidDOT:RFID delegation and ownership transfer made simple[C]// The International Conference on Security and Privacy in Communication Netowrks. 2008: 1-8. |
[13] | KULSENG L , YU Z , WEI Y ,et al. Lightweight mutual authentication and ownership transfer for RFID systems[C]// IEEE Infocom. 2010: 1-5. |
[14] | CHEN C L , HUANG Y C , JIANG J R . A secure ownership transfer protocol using EPCglobal Gen-2 RFID[J]. Telecommunication Systems, 2013,53(4): 387-399. |
[15] | CHEN C L , CHIEN C F . An ownership transfer scheme using mobile RFIDs[J]. Wireless Personal Communications an International Journal, 2013,68(3): 1093-1119. |
[16] | MUNILLA J , GUO F , SUSILO W . Cryptanalaysis of an EPCC1G2 standard compliant ownership transfer scheme[J]. Wireless Personal Communications, 2013,72(1): 245-258. |
[17] | ZUO Y , . Changing hands together:a secure group ownership transfer protocol for RFID tags[C]// Hawaii International Conference on System Sciences. 2010: 1-10. |
[18] | JANNATI H . Cryptanalysis and enhancement of a secure group ownership transfer protocol for RFID tags[J]. Lecture Notes of the Institute for Computer Sciences Social Informatics & Telecommunications Engineering, 2011(99): 186-193. |
[19] | DOSS R , ZHOU W , YU S . Secure RFID Tag ownership transfer based on quadratic residues[J]. IEEE Transactions on Information Forensics & Security, 2013,8(2): 390-401. |
[20] | YANG M H , HU H Y . Protocol for ownership transfer across authorities:with the ability to assign transfer target[J]. Security &Communication Networks, 2012,5(5): 164-177. |
[21] | SUNDARESAN S , DOSS R , ZHOU W . Secure ownership transfer in multi-tag/multi-owner passive RFID systems[C]// Global Communications Conference. 2013: 2891-2896. |
[22] | XIN W , GUAN Z , YANG T ,et al. An efficient privacy-preserving RFID ownership transfer protocol[M]// Web Technologies and Applications. Berlin:Springer, 2013: 538-549. |
[23] | SUNDARESAN S , DOSS R , ZHOU W ,et al. Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy[J]. Computer Communications, 2015,55: 112-124. |
[24] | 张学军, 王玉, 王锁萍 ,等. 基于循环移位的轻量型相互认证协议研究[J]. 电子学报, 2012,40(11): 2270-2275. |
ZHANG X J , WANG Y , WANG S P ,et al. Research on the cyclic shift lightweight mutual authentication protocol[J]. Acta Electronica Sinica, 2012,40(11): 2270-2275. | |
[1] | RAY B , CHOWDHURY M U , PHAM T . Mutual authentication with malware protection for a RFID system[C]// The International Conference on Advances in Distributed and Parallel Computing ADPC. 2010: 24-29. |
[2] | SONG B , MITCHELL C J . Scalable RFID security protocols supporting tag ownership transfer[J]. Computer Communications, 2011,34(4): 556-566. |
[25] | 贺蕾, 甘勇, 尹毅峰 ,等. 基于随机排列函数的 RFID 标签所有权转换协议[J]. 郑州大学学报:工学版, 2013,34(6): 24-27. |
HE L , GAN Y , YIN Y F ,et al. Ownership transfer protocol of RFID tags based on random permutation functions[J]. Journal of Zhengzhou University (Engineering Science), 2013,34(6): 24-27. | |
[3] | ERGULER I , ANARIM E . Security flaws in a recent RFID delegation protocol[J]. Personal & Ubiquitous Computing, 2012,16(3): 337-349. |
[4] | TRUJILLO-RASUA R , SOLANAS A , PéREZ-MARTíNEZ P A ,et al. Predictive protocol for the scalable identification of RFID tags through collaborative readers[J]. Computers in Industry, 2012,63(6): 557-573. |
[26] | 贺蕾, 甘勇, 尹毅峰 ,等. 一种 RFID 标签授权访问和所有权转换协议[J]. 合肥工业大学学报, 2014(2): 172-175. |
HE L , GAN Y , YIN Y F ,et al. A delegation and ownership transfer protocol of tag in RFID system[J]. Journal of Hefei University, 2014(2): 172-175. | |
[5] | IMRAN E , EMIN A , GOKAY S . A salient missing link in RFID security protocols[J]. Eurasip Journal on Wireless Communications& Networking, 2011(1): 5412-5483. |
[6] | 周永彬, 冯登国 . RFID 安全协议的设计与分析[J]. 计算机学报, 2006,29(4): 581-589. |
[27] | 甘勇, 李天豹, 贺蕾 ,等. 基于动态重载的 RFID 标签所有权转换协议研究[J]. 轻工学报, 2016,31(2): 97-102. |
GAN Y , LI T B , HE L ,et al. Study of RFID tag ownership transfer protocol based on dynamic overloading[J]. Journal of Light Industry, 2016,31(2): 97-102. | |
[6] | ZHOU Y B , FENG D G . Design and analysis of cryptographic protocols for RFID[J]. Chinese Journal of Computers, 2006,29(4): 581-589. |
[7] | OSAKA K , TAKAGI T , YAMAZAKI K ,et al. An efficient and secure RFID security method with ownership transfer[C]// Computational Intelligence and Security. 2006: 1090-1095. |
[28] | SHAMIR A , . How to share a secret[C]// Communications of the ACM. 1976: 612-613. |
[29] | BLAKLEY G R , . Safeguarding cryptographic keys[C]// The 1979 AFIPS National Computer Conference. 1979: 313-317. |
[8] | KAPOOR G , PIRAMUTHU S . Single RFID tag ownership transfer protocols[J]. IEEE Transactions on Systems Man & Cybernetics Part C Applications & Reviews, 2012,42(2): 164-173. |
[9] | FOULADGAR S , AFIFI H . A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags[J]. Journal of Communications, 2007,2(6): 6-13. |
[10] | J?PPINEN P , H?M?L?INEN H . Enhanced RFID security method with ownership transfer[C]// International Conference on Computational Intelligence and Security. 2008: 382-385. |
[11] | KAPOOR G , PIRAMUTHU S . Vulnerabilities in some recently proposed RFID ownership transfer protocols[J]. Communications Letters IEEE, 2010,14(14): 354-357. |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163. |
[15] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|