Enhanced RFID security method with Ownership transfer

被引:0
作者
Jappinen, Pekka [1 ]
Hamalainen, Harri [1 ]
机构
[1] Lappeenranta Univ Technol, Lappeenranta 53851, Finland
来源
2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS | 2008年
关键词
RFID; Security; Ownership transfer;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The popularity of Radio Frequency Identification (RFID) has raised the interest towards its security. Threat concerns towards individuals privacy slows down the adoption of the technology in the new innovative application areas. In this paper we will describe simple and efficient security method for lightweight RFID tags with support for ownership transfer. It based on solution described by Osaka et al, which had some security flaws. Our solution fixes the security flaws while maintaining the simplicity and efficiency of the original method.
引用
收藏
页码:943 / 946
页数:4
相关论文
共 14 条
[1]  
Avoine G., RFID SECURITY PRIVAC
[2]   Roadmap to solving security and privacy concerns in RFID systems [J].
University of the South Pacific, Fiji .
Comput Law Secur Rep, 2007, 6 (555-561)
[3]   Strong crypto for RFID tags - A comparison of low-power hardware implementations [J].
Feldhofer, Martin ;
Wolkerstorfer, Johannes .
2007 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, 2007, :1839-1842
[4]  
Fouladgar S., 2007, J COMMUNICATIONS, V2, P6
[5]   RFID security and privacy: A research survey [J].
Juels, A .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :381-394
[6]   RFID protocol enabling ownership transfer to protect against traceability and DoS attacks [J].
Lei, Hong ;
Cao, Tianjie .
PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, :508-510
[7]  
Molnar D, 2006, LECT NOTES COMPUT SC, V3897, P276
[8]   An efficient and secure RFID security method with ownership transfer [J].
Osaka, Kyosuke ;
Takagi, Tsuyoshi ;
Yamazaki, Kenichi ;
Takahashi, Osamu .
2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, :1090-1095
[9]   Protocols for RFID tag/reader authentication [J].
Piramuthu, Selwyn .
DECISION SUPPORT SYSTEMS, 2007, 43 (03) :897-914
[10]  
Schneier B, 1995, Applied Cryptography, V2nd