• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Jin Yongming, Sun Huiping, Guan Zhi, Chen Zhong. Ownership Transfer Protocol for RFID Tag[J]. Journal of Computer Research and Development, 2011, 48(8): 1400-1405.
Citation: Jin Yongming, Sun Huiping, Guan Zhi, Chen Zhong. Ownership Transfer Protocol for RFID Tag[J]. Journal of Computer Research and Development, 2011, 48(8): 1400-1405.

Ownership Transfer Protocol for RFID Tag

More Information
  • Published Date: August 14, 2011
  • Radio frequency identification (RFID) is becoming ubiquitous at present, which is suitable for ubiquitous computing environment. Its flexibility holds great promise for novel applications, and increasingly RFID tags are being deployed. RFID security and privacy is the basic requirement in most applications. Conventional security primitives cannot be integrated in RFID tags as they have inadequate computation capabilities with extremely limited resources. Therefore, it is important to have some lightweight security mechanisms suitable for RFID tags. A tagged item will be often passed to a new owner. The privacy of the new (as well as the past) owner should be guaranteed. Based on SQUASH—a message authentication code (MAC) with provable security properties for highly constrained devices, a new lightweight ownership transfer protocol is proposed. The new protocol has more efficient performance than other Hash-based schemes. Moreover, it achieves very strong notion of security and it is the first protocol based on SQUASH whose security properties have been proven. Finally, the new protocol can protect the forward and backward privacy of both parties that is very important requirement in the ownership transfer application.
  • Related Articles

    [1]Zhang Wei, Han Linyu, Zhang Dianlei, Ren Pengjie, Ma Jun, Chen Zhumin. GeoPMF: A Distance-Aware Tour Recommendation Model[J]. Journal of Computer Research and Development, 2017, 54(2): 405-414. DOI: 10.7544/issn1000-1239.2017.20150822
    [2]Xin Wei, Sun Huiping, Chen Zhong. Analysis and Design of Distance-Bounding Protocols for RFID[J]. Journal of Computer Research and Development, 2013, 50(11): 2358-2366.
    [3]Yang Liu, Yu Jian, Jing Liping. An Adaptive Large Margin Nearest Neighbor Classification Algorithm[J]. Journal of Computer Research and Development, 2013, 50(11): 2269-2277.
    [4]Zhao Xiaoming, Ye Xijian. A New Approach to Ridgelet Transform[J]. Journal of Computer Research and Development, 2008, 45(5): 915-922.
    [5]He Honghui, Wang Lizhen, and Zhou Lihua. pgi-distance: An Efficient Method Supporting Parallel KNN-join Process[J]. Journal of Computer Research and Development, 2007, 44(10): 1774-1781.
    [6]Liu Bing, Wang Wei, and Shi Baile. The Tight Estimation Distance Using Wavelet[J]. Journal of Computer Research and Development, 2006, 43(10): 1732-1737.
    [7]Ming Xing, Liu Yuanning, Zhu Xiaodong, Xu Tao. Iris Recognition Based on Wavelet Transform with Shift Invariance Preprocessing[J]. Journal of Computer Research and Development, 2006, 43(7): 1186-1193.
    [8]Song Chuanming, Wang Xianghai. A Shape Adaptive Integer Wavelet Coding Algorithm Based on New Quantization Scheme[J]. Journal of Computer Research and Development, 2006, 43(4): 695-701.
    [9]Ji Qijin and Dong Yongqiang. Self-Similar Traffic Synthesizing Using Gaussian Mixture Model in Wavelet Domain[J]. Journal of Computer Research and Development, 2006, 43(3): 389-394.
    [10]Shang Zhaowei, Zhang Mingxin, Zhao Ping, Shen Junyi. Different Complex Wavelet Transforms for Texture Retrieval and Similarity Measure[J]. Journal of Computer Research and Development, 2005, 42(10): 1746-1751.

Catalog

    Article views (893) PDF downloads (704) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return