计算机工程 ›› 2019, Vol. 45 ›› Issue (4): 136-141.doi: 10.19678/j.issn.1000-3428.0052360

• 安全技术 • 上一篇    下一篇

满足后向安全的RFID标签组所有权转移协议

魏访1,邹志革2   

  1. 1.武汉职业技术学院 电子信息工程学院,武汉 430074; 2.华中科技大学 光学与电子信息学院,武汉 430074
  • 收稿日期:2018-08-10 出版日期:2019-04-15 发布日期:2019-04-15
  • 作者简介:魏访(1976—),女,副教授,主研方向为信息安全、光电子信息技术;邹志革,副教授、博士。
  • 基金项目:

    湖北省教育厅科学技术研究计划指导性项目“基于机器视觉的激光标刻系统的研究”(B201658)。

RFID Tag Group Ownership Transfer Protocol Satisfying Backward Security

WEI Fang1,ZOU Zhige2   

  1. 1.School of Electronic Information Engineering,Wuhan Polytechnic,Wuhan 430074,China; 2.School of Optical and Electronic Information,Huazhong University of Science and Technology,Wuhan 430074,China
  • Received:2018-08-10 Online:2019-04-15 Published:2019-04-15

摘要:

多数标签所有权转移协议只适用于单个标签的所有权转移,无法实现标签组一次转移。为此,提出一种基于可信第三方的无线射频识别标签组所有权转移协议。在确保新旧所有者与标签进行双向认证基础上,通信消息利用交叉位运算、字合成运算进行加密。在通信消息加密过程中混入随机数,使前后2次通信消息有区别,增大破解难度。可信第三方的参与,使新所有者与标签直接同步更新密钥,不通过原所有者,保证协议的后向安全性。性能分析结果表明,该协议具有较高的安全性和较低的成本。

关键词: 无线射频识别, 所有权转移, 后向安全, 标签组, 位运算, 暴力破解

Abstract:

Most of tag ownership transfer protocols are only applicable to the single tag ownership transfer,and are not suitable for the tag group transfer at one time.To solve this problem,a Radio Frequency Identification(RFID) tag group ownership transfer protocol based on trusted third party is proposed.Based on ensuring the bidirectional authentication between the new and old owners and the tags,the communication messages are encrypted by the cross-bit operation and the word synthesis operation.In the process of encrypting the communication messages,the random numbers are mixed,so that the front-to-back communication messages are different,and the crack is increasingly difficult.Based on the participation of trusted third party,without the original owner,the new owner can update the private key directly with the tag to ensure the backward security of the protocol.Performance analysis results show that this protocol has higher security and lower cost.

Key words: Radio Frequency Identification(RFID), ownership transfer, backward security, tag group, bit operation, brute force crack

中图分类号: