Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model

نویسندگان

  • Jorge Munilla
  • Alberto Peinado
  • Guomin Yang
  • Willy Susilo
چکیده

Ownership Transfer Protocols for RFID allow transferring the rights over a tag from a current owner to a new owner in a secure and private way. Recently, Kapoor and Piramuthu have proposed two schemes which overcome most of the security weaknesses detected in previously published protocols. Still, this paper reviews that work and points out that such schemes still present some practical and security issues. In particular, they do not manage to guarantee the privacy of the new owner without the presence of a Trusted Third Party, and we find that the assumed communication model is not suitable for many practical scenarios. We then propose here a lightweight protocol that can be used in a wider range of applications, and which incorporates recently defined security properties such as Tag Assurance, Undeniable Ownership Transfer, Current Ownership Proof and Owner Initiation. Finally, this protocol is complemented with a proposed Key Change Protocol, based on noisy tags, which provides privacy to the new owner without either resorting to a Trusted Third Party or assuming an Isolated Environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation

RFID systems allow fast and automatic identification of RFID tags through a wireless channel. Information on product items like name, model, purpose, expiration date, etc., can be easily stored and retrieved from RFID tags attached to items. That is why, in the near future, RFID tags can be an active part of our everyday life when interacting with items around us. Frequently, such items may cha...

متن کامل

Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer

RFID technology arouses great interests from both its advocates and opponents because of the promising but privacy-threatening nature of low-cost RFID tags. A main privacy concern in RFID systems results from clandestine scanning through which an adversary could conduct silent tracking and inventorying of persons carrying tagged objects. Thus, the most important security requirement in designin...

متن کامل

A Novel RFID Authentication Protocol with Ownership Transfer

During recent years,RFID technology has a wide applications in many fields.Since singnal transmit by the radio frequency, it raises many security and privacy concerns. Ownership transfer of RFID tags is another requriement for RFID systems. During the life of tag, it may pass from manufacutrer to commercial agent, the ownership of tag need change correspondingly.Taking into account the natural ...

متن کامل

An Improved Ownership Transfer for RFID Protocol

The ownership transfer problems occur during using the RFID tag. In view of the problems of the RFID tag ownership transfer protocol, such as security defects and high computational cost, an improved lightweight RFID tag ownership transfer protocol is proposed in this paper. The improved protocol does not depend on the trusted third party, so that the improved protocol has a wider application s...

متن کامل

Secure Ownership and Ownership Transfer in RFID Systems

Radio frequency identification (RFID) is an upcoming technology with a large potential, but it also introduces a number of threats. Ownership transfer has been introduced to mitigate the risks which are caused by changes in ownership of RFID tags. We present formal definitions for ownership and ownership transfer in RFID systems and their secure variants. These definitions can be used to verify...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013