Advanced Search
Volume 38 Issue 8
Sep.  2016
Turn off MathJax
Article Contents
CHEN Xiuqing, CAO Tianjie, ZHAI Jingxuan. Provable Secure for the Lightweight RFID Ownership Transfer Protocol[J]. Journal of Electronics & Information Technology, 2016, 38(8): 2091-2098. doi: 10.11999/JEIT151049
Citation: CHEN Xiuqing, CAO Tianjie, ZHAI Jingxuan. Provable Secure for the Lightweight RFID Ownership Transfer Protocol[J]. Journal of Electronics & Information Technology, 2016, 38(8): 2091-2098. doi: 10.11999/JEIT151049

Provable Secure for the Lightweight RFID Ownership Transfer Protocol

doi: 10.11999/JEIT151049
Funds:

The National Natural Science Foundation of China (61303263), The 333 Project of Jiangsu Province (BRA2014047), The Six-top-talents High-level Talent Cultivation Project Research Funds of Jiangsu Province (2014-WLW-023)

  • Received Date: 2015-09-17
  • Rev Recd Date: 2016-05-13
  • Publish Date: 2016-08-19
  • In order to implement the wisdom city planning and build perfect wisdom network, it is important to design the security Radio Frequency IDentification (RFID) protocol. A secure RFID ownership transfer protocol should be evaluated in terms of the security and privacy properties. In particular, there are two important privacy properties included forward untraceable and backward untraceable in the practical application of RFID system. In order to solve the various security and privacy problems, this paper enhances the unreasonable assumption that the attacker misses the key-update session in the definition of forward untraceable, then proposes the definition of strong forward untraceable. In addition, this paper designs the lightweight RFID ownership transfer protocol based on quadratic residues, and uses the enhanced model and definitions to formal prove the security and privacy properties. Moreover, the proof results not only show that the scheme resists against inner reader malicious im-personation attack, tracing attack, tag impersonation attack and desynchronization attack, but also formally prove that the proposed protocol meets strong forward untraceable and backward untraceable properties. In addition, the analysis results demonstrate that the protocol based on low-cost and high efficiency is superior to other protocols in the security and performance properties.
  • loading
  • CHEN Yalin, CHOU Juesam, and SUN Hungmin. A novel mutual authentication scheme based on quadratic residues for RFID systems[J]. Computer Networks, 2008, 52(12): 2373-2380. doi: 10.1016/j.comnet.2008.04.016.
    YEH Tzuchang, WU Chienhung, and TSENG Yuhmin. Improvement of the RFID authentication scheme based on quadratic residues[J]. Computer Communications, 2011, 34(3): 337-341. doi: 10.1016/j.comcom.2010.05.011.
    DOSS Robin, SUNDARESAN Saravanan, and ZHOU Wanlei. A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems[J]. Ad Hoc Networks, 2013, 11(1): 383-396. doi: 10.1016/j.adhoc. 2012.06.015.
    DOSS Robin and ZHOU Wanlei. A secure tag ownership transfer scheme in a closed loop RFID system[C]. Proceedings of the Wireless Communications and Networking Conference Workshops (WCNCW), Paris, 2012: 164-169.
    DOSS Robin, ZHOU Wanlei, and YU Shui. Secure RFID tag ownership transfer based on quadratic residues[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(2): 390-401. doi: 10.1109/TIFS.2012.2235834.
    谢润, 许春香, 陈文杰, 等. 一种具有阅读器匿名功能的射频识别认证协议[J]. 电子与信息学报, 2015, 37(5): 1241-1247. doi: 10.11999/JEIT140902.
    XIE Run, XU Chunxiang, CHEN Wenjie, et al. An RFID authentication protocol anonymous against readers[J]. Journal of Electronics Information Technology, 2015, 37(5): 1241-1247. doi: 10.11999/JEIT140902.
    金永明, 孙惠平, 关志, 等. RFID 标签所有权转移协议研究 [J]. 计算机研究与发展, 2011, 48(8): 1400-1405.
    JIN Yongming, SUN Huiping, GUAN Zhi, et al. Ownership transfer protocol for RFID tag[J]. Journal of Computer Research and Development, 2011, 48(8): 1400-1405.
    ALAGHEBAND Mahdi R and AREF Mohammad R. Simulation-based traceability analysis of RFID authentication protocols[J]. Wireless Personal Communications, 2014, 77(2): 1019-1038. doi: 10.1007/ s11277-013-1552-7.
    MORIYAMA Daisuke. Cryptanalysis and Improvement of A Provably Secure RFID Ownership Transfer Protocol[M]. Lightweight Cryptography for Security and Privacy, Springer Berlin Heidelberg, 2013: 114-129. doi: 10.1007/978-3-642- 40392-7_9.
    ELKHIYAOUI Kaoutar, BLASS Erik-Oliver, and MOLVA Refik. ROTIV: RFID Ownership Transfer with Issuer Verification[M]. RFID Security and Privacy, Springer Berlin Heidelberg, 2012: 163-182. doi: 10.1007/978-3-642-25286- 0_11.
    CHIEN Hungyu. Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices[J]. Computer Networks, 2013, 57(14): 2705-2717. doi: 10.1016/j.comnet.2013.06.005.
    VAN Deursen T. Security of RFID protocols[D]. [Ph.D. dissertation], University of Luxembourg, Luxembourg, 2011.
    张辉, 侯朝焕, 王东辉. 一种基于部分ID的新型RFID安全隐私相互认证协议[J]. 电子与信息学报, 2009, 31(4): 853-856.
    ZHANG Hui, HOU Chaohuan, and WANG Donghui. A new security and privacy on RFID mutual authentication protocol based on partial ID[J]. Journal of Electronics Information Technology, 2009, 31(4): 853-856.
    LI Nan, MU Yi, SUSILOA Willy, et al. Shared RFID ownership transfer protocols[J]. Computer Standards Interfaces, 2015, 42: 95-104. doi: 10.1016/j.csi.2015.05.003.
    ZHANG Shigeng, LIU Xuan, WANG Jianxin, et al. Energy-efficient active tag searching in large scale RFID systems shigeng[J]. Information Sciences, 2015, 317: 143-156. doi: 10.1016/j.ins.2015.04.048.
    HSI Chengter, LIEN Yuanhung, CHIU Junghui, et al. Solving scalability problems on secure RFID grouping-proof protocol [J]. Wireless Personal Communications, 2015, 84(2): 1069-1088. doi: 10.1007/s11277-015-2676-8.
    AKGUN Mete and ?AGLAYAN M Ufuk. Providing destructive privacy and scalability in RFID systems using PUFs[J]. Ad Hoc Networks, 2015, 32: 32-42. doi: 10.1016/ j.adhoc.2015.02.001.
    ZHANG Daqiang, QIAN Yuming, WAN Jiafu, et al. An efficient RFID search protocol based on clouds[J]. Mobile Network Application, 2015, 20: 356-362. doi: 10.1007/ s11036-015-0597-0.
    VAUDENAY Serge. On Privacy Models for RFID[M]. Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2007, 4833: 68-87. doi: 10.1007/978-3-540- 76900-2_5.
    PHAN Raphael C W, WU Jiang, OUAFI Khaled, et al. Privacy analysis of forward and backward untraceable RFID authentication schemes[J]. Wireless Personal Communications, 2011, 61(1): 69-81. doi: 10.1007/s11277- 010-0001-0.
    NIU Haifeng, TAQIEDDIN Eyad, and JAGANNATHAN S. EPC gen2v2 RFID standard authentication and ownership management protocol[J]. IEEE Transactions on Mobile Computing, 2016, 15(1): 137-149. doi: 10.1109/TMC.2015. 2412933.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1124) PDF downloads(366) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return