Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags

نویسندگان

  • Hoda Jannati
  • Abolfazl Falahati
چکیده

Ownership transfer and grouping proof protocols are the two most important requirements for RFID tag in various applications such as pharmaceutical distribution and manufacturing. In 2010, Zuo integrated these two requirements and introduced a protocol for RFID tag group ownership transfer (GOT), i.e., transferring the ownership of a group of tags in one session. However, this paper shows that Zuo’s protocol is vulnerable to de-synchronization attack and tag impersonating in the presence of cheating old owner. This paper also proposes solutions to fix the security flaws of Zuo’s GOT protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

Secure Group Ownership Transfer Protocol for Tags in RFID System

It was proposed a secure group ownership transfer protocol for tags in RFID system to transfer the ownership of multiple tags simultaneously. Old owner executes authentication and updates secrets of a group of tags. Afterwards, it sends the secrets updated to new owner in a secure way. New owner also implements authentication and update procedure with tags. The protocol was analyzed by using GN...

متن کامل

A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation

RFID systems allow fast and automatic identification of RFID tags through a wireless channel. Information on product items like name, model, purpose, expiration date, etc., can be easily stored and retrieved from RFID tags attached to items. That is why, in the near future, RFID tags can be an active part of our everyday life when interacting with items around us. Frequently, such items may cha...

متن کامل

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

Secure Ownership and Ownership Transfer in RFID Systems

Radio frequency identification (RFID) is an upcoming technology with a large potential, but it also introduces a number of threats. Ownership transfer has been introduced to mitigate the risks which are caused by changes in ownership of RFID tags. We present formal definitions for ownership and ownership transfer in RFID systems and their secure variants. These definitions can be used to verify...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011