RFID Tag Ownership Transfer Protocol for A Closed Loop System

被引:5
作者
Al Gaith, K. D. [1 ]
Ray, Biplob Rakshit [1 ]
Chowdhury, Morshed [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic 3217, Australia
来源
2014 IIAI 3RD INTERNATIONAL CONFERENCE ON ADVANCED APPLIED INFORMATICS (IIAI-AAI 2014) | 2014年
关键词
RFID; Tag data confidentiality; Tag ownership transfer; transfer scenario;
D O I
10.1109/IIAI-AAI.2014.124
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the RFID system a tag is attached to an object which might own by a number of people during its life cycle. As a result, the RFID system requires to transfer ownership of the tag. The ownership transfer has to protect privacy of current and new owner. There are number of ownership transfer protocol proposed to achieve secure ownership transfer. However, most of them are impractical or insecure to implement on current passive RFID tags. We are presenting an ownership transfer protocol using timer based shared secret for closed loop RFID systems. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.
引用
收藏
页码:575 / 579
页数:5
相关论文
共 13 条
[1]  
Chen H., 2009, ICUIMC
[2]  
Doss R, 2012, WIR COMM NETW C WORK
[3]  
Japinnen P., 2008, P INT C COMP INT SEC
[4]   Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols [J].
Kapoor, Gaurav ;
Piramuthu, Selwyn .
IEEE COMMUNICATIONS LETTERS, 2010, 14 (03) :260-262
[5]  
Lin I.C., 2010, INT J INNOVATIVE COM
[6]   An efficient and secure RFID security method with ownership transfer [J].
Osaka, Kyosuke ;
Takagi, Tsuyoshi ;
Yamazaki, Kenichi ;
Takahashi, Osamu .
2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, :1090-1095
[7]  
Pateriya, 2011, INT C COMM NETW TECH
[8]  
Ray BR, 2012, COMP CONV TECHN ICCC, P1185
[9]   Scalable RFID security protocols supporting tag ownership transfer [J].
Song, Boyeon ;
Mitchell, Chris J. .
COMPUTER COMMUNICATIONS, 2011, 34 (04) :556-566
[10]  
Syamsuddin, 2012, ICACSIS