A multi-issued tag key agreement with time constraint for homeland defense sub-department in NFC environment

被引:14
作者
Chen, Hsing-Chung [1 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
关键词
Cryptography; Security; RFID Security; Secure multiple issued tag; Homeland defense and security; SECURITY;
D O I
10.1016/j.jnca.2013.05.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the proliferation of variety RFID applications supporting homeland security and defense missions, mobile devices need to store many different RFID tags to access multiple homeland defense sub-departments. Although the integration technologies of RFID systems and mobile devices have been defined and appeared in some NFC specifications. In recently years, combine the technologies of Near Field Communication (NFC) in Mobile devices can improve constraint computation capability and memory usage for Radio Frequency Identifications (RFID) systems. Nevertheless, currently some NFC secure key management mechanisms manage these secure multiple secret keys are needed to be very large duplicated storage space using lots of RFID tags, and they still lack the efficiency and flexibility in the management. In this paper, we first propose a multi-issued tag key agreement with time constraint, accompanying a new type of secure tag, called as a secure multi-issued tag, to deal with the problem of the management of multiple secure accesses. To achieve the requirement of near field spatial communications, each secure multi-issued tag can be authorized by distinct missions belonging to distinct group served among homeland defense sub-departments. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:88 / 98
页数:11
相关论文
共 26 条
[1]  
[Anonymous], 1978, The Theory of Error-Correcting Codes
[3]  
Ateniese G., 2005, Proc. ACM Conf. on Computer and Communication Security (ACM CCS 2005), P92, DOI DOI 10.1145/1102120.1102134.19
[4]  
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[5]   An improved key distribution mechanism for large-scale hierarchical wireless sensor networks [J].
Cheng, Yi ;
Agrawal, Dharma P. .
AD HOC NETWORKS, 2007, 5 (01) :35-48
[6]  
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[7]   Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network [J].
Feng, Li ;
Li, Zili ;
Zhang, Yi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (04) :781-787
[8]  
Golle P, 2004, LECT NOTES COMPUT SC, V2964, P163
[9]  
Jeedella JSY, 2012, IEEE MEDITERR ELECT, P375, DOI 10.1109/MELCON.2012.6196452
[10]  
Juels A, 2003, LECT NOTES COMPUT SC, V2742, P103