|Table of Contents|

Design and Analysis of Single RFID Ownership Transfer Protocol(PDF)

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

Issue:
2015年02期
Page:
65-
Research Field:
计算机与信息工程
Publishing date:

Info

Title:
Design and Analysis of Single RFID Ownership Transfer Protocol
Author(s):
Gui Yiqi1Zhang Jie2
(1.Department of Information Engineering,Yangzhou University,Yangzhou 225009,China) (2.Department of IOT Engineering,Hohai University,Nanjing 210098,China)
Keywords:
RFIDownership transferBAN logicstrand space
PACS:
TP393.08
DOI:
-
Abstract:
While the major existing RFID security protocols address tag authentication issues,the ability of transferring ownership of these tagged objects is most equally important. Recently,though some lightweight encrypted authentication protocols have been proposed to solve the problem,most of them assume that the channel between the RFID reader and the DB sever is so secure that the backward un-traceability is ignored. We consider a few RFID ownership transfer mutations and propose a single authentication RFID ownership transfer protocol that is lightweight and secure. Due to challenge response mechanism,the protocol achieves mutual authentication between tag and DB server. Also,we provide security analysis to evaluate and proof the accuracy based on BAN logic and strand space. The merit of our protocol achieves high-security and high-efficiency.

References:

[1] Osaka K,Takagi T,Yamazaki K,et al. An efficient and secure RFID security method with ownership transfer[J]. Computational Intelligence and Security,2006,2:1 090-1 091.
[2]Thayer Fabrega F W,Herzog J C,Guttman J D. Strand space:providing security protocols correct[J]. J Compute Security,1999,7:191-230.
[3]Burrows M,Abadi M,Needham R. A logic of authentication[J]. ACM Transactions on Computer,1990,8(1):18-36.
[4]Yiqi G,Jie Z,Hwangkye C. An improved RFID Security method with ownership transfer[C]//Proceedings of ICTC. Seoul,Korea,2011:594-596.
[5]Chen H B,Lee W B,Zhao Y H,et al. Enhancement of the RFID security method with ownership transfer[C]//Proc Int Conf Ubiquitous Inform Manage. Communication,Suwan,Korea,2009:251-254.
[6]Lei H,Cao T. RFID protocol enabling ownership transfer to protect against traceability and DoS attacks[C]//Proc 1st Int Symp Data,Privacy E-Commerce. Chengdu,2007:508-510.
[7]Jappinen P,Hamalainen H. Enhanced RFID security method with ownership transfer[J]. International Conference on Computational Intelligence and Security,2008,2(13-17):382-385.
[8]Eunjun Y,Keeyoung Y. Two security problems of RFID security method with ownership transfer[C]//Proc IFIP Int Conf Netw. Parallel Compute,Shanghai,2008:68-73.
[9]Song B,Mitchell J. Scalable RFID security protocols supporting tag ownership transfer[J]. Computer Communications,2011,34(4):556-566.
[10]张兵,马新新,秦志光. Hash运算的RFID认证协议分析和改进[J]. 计算机应用研究,2011,28(11):4 311-4 314.
Zhang Bing,Ma Xinxin,Qin Zhiguang. Analysis and improvement of hash-based RFID authentication protocol[J]. Application Research of Computers,2011,28(11):4311-4314.(in Chinese)

Memo

Memo:
-
Last Update: 2015-06-20