JOURNAL BROWSE
Search
Advanced SearchSearch Tips
RFID Tag Ownership Relocation Protocol Based on Trusted Third Party
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
RFID Tag Ownership Relocation Protocol Based on Trusted Third Party
Kim, Young-Sik;
  PDF(new window)
 Abstract
Recently RFID not only is widely utilized in various fields such as inventory management, merchandize logistics, etc., but also, has evolved as an important component of the Internet of Things (IoT). According to increasing the utilization field of RIFD, studies for security and privacy for RFID system have been made diverse. Among them, the ownership transfer protocols for RFID tags have also been proposed in connection with the purchase of products embedded with RFID tag. Recently, Kapoor and Piramuthu proposed a RFID ownership transfer protocol to solve the problems of security weakness of the previous RFID ownership transfer protocols. In this paper, we show that Kapoor-Piramuthu's protocol also has security problems and provide a new protocol to resolve them. Security analysis of newly proposed protocol shows the security concerns are resolved.
 Keywords
ownership transfer protocol (OTP);trusted third party;authentication;RFID;lightweight cryptography;
 Language
Korean
 Cited by
 References
1.
S. Dominikus and J.-M. Schmidt, "Connecting passive RFID tags to the internet of things," in Proc. Interconnecting Smart Objects with the Internet Workshop, Prague, 2011.

2.
W. S. Choi, S. S. Kim, Y. H. Kim, T. J. Yoon, K. W. Ahn, and K. J. Han, "Design of PUF-based encryption processor and mutual authentication protocol for low-cost RFID authentication," J. KICS, vol. 39, no. 12, pp. 831-841, Dec. 2014.

3.
J. S. Kim, J. K. Park, and Y. T. Shin, "RFID-based automatic inspection system design and implementation for manufacturing and retail industry," J. KICS, vol. 39, no. 1, pp. 97-105, Jan. 2014.

4.
S. J. Oh, C. H. Lee, T. J. Yoon, K. H. Chung, and K. S. Ahn, "Improved authentication protocol for privacy protection in RFID systems," J. KICS, vol. 38, no. 1, pp. 12-18, Jan. 2013.

5.
D. Molnar, A. Soppera, and D. Wagner, "A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags," in Workshop on RFID Security and Light-Weight Crypto., Jul. 2005.

6.
J. Saito, K. Imamoto, and K. Sakurai, "Reassignment scheme of an RFID tag's key for owner transfer," in Proc. EUC Workshops, vol. 3823 LNCS, pp. 1303-1312, 2005.

7.
G. Kapoor and S. Piramuthu, "Single RFID tag ownership transfer protocols," IEEE Trans. Systems, Man, and Cybernetics, Part C, vol. 42, no. 2, pp. 164-173, 2012.

8.
G. Kapoor, W. Zhou, and S. Piramuthu, "Multi-tag and multi-owner RFID ownership transfer in supply chains," Decision Support Syst., vol. 52, no. 1, pp. 258-270, 2011. crossref(new window)

9.
H. Lei and T. Cao, "RFID protocol enabling ownership transfer to protect against traceability and dos attacks," in Proc. 1st Int. Symp. Data, Privcacy E-Commerce, pp. 508-510, 2007.

10.
G. Kapoor and S. Piramuthu, "Single RFID tag ownership transfer protocols," IEEE Trans. Syst., Man, and Cybernetics, Part C, vol. 42, no. 2, pp. 164-173, 2012.

11.
G. Kapoor, W. Zhou, and S. Piramuthu, "Multi-tag and multi-owner RFID ownership transfer in supply chains," Decision Support Syst., vol. 52, no. 1, pp. 258-270, 2011. crossref(new window)

12.
G. Kapoor and S. Piramuthu, "Vulnerabilities ini some recently proposed RFID ownership transfer protocols," in Proc. NetCoM'09, pp. 354-357, 2009.