Font Size: a A A

Research On Secure Ownership Transfer Protocol For RFID Tags

Posted on:2016-02-02Degree:MasterType:Thesis
Country:ChinaCandidate:Z ZhouFull Text:PDF
GTID:2308330479455433Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification(RFID) tag ownership is that the owner of the tag(legal reader or database) exercises properly its various functions, such as obtaining information inside the tag, changing and writing again, or authorizing the tag ownership to other entities. In order to protect the ownership, a secure RFID tag ownership transfer is necessary. If goods labeled by tag simply has a physical transfer, and the ownership of the tag recording information of the goods and the current owner doesn’t shift, there is a risk that the new owner and the current owner use their information about tags steal each other’s privacy. To eliminate the threat of security and privacy in the process of ownership transfer, ownership transfer security protocols are needed to rely on. This paper makes a thorough research of the RFID tag ownership transfer protocol and its application, the main contents are as follows:(1) By analyzing application scenarios and security requirements of RFID ownership transfer, the related design methods are discussed.(2) Through introducing the Anti-counterfeiting function into ownership transfer, a secure RFID tag ownership transfer protocol with anti-counterfeiting property was proposed based on the elliptic curve discrete logarithm problem and transmission encryption. Compared with the similar schemes, it reduces the computation for the tag. Further the security of the protocol is proved by using the GNY logic.(3) RFID tags flowing in supply chains involved in the issues of nodes privacy and the visibility of the supply chain management, for which this paper defines security requirements of the RFID tag ownership transfer in supply chains, proposes a universally composable model and designes a RFID tag ownership transfer protocol to implement the universally composable model,based on the RFID authentication protocol proposed.(4) On the J2 EE and J2 SE development platform,the simulation and verification of the RFID communication protocols in supply chains are performed, the results show that the protocols in the software application are feasible, to prepare for the practical application.
Keywords/Search Tags:Radio Frequency Identification, ownership transfer, Elliptic Curve, supply chains, universally composable security
PDF Full Text Request
Related items