Secure ownership and ownership transfer in RFID systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Across-authority lightweight ownership transfer protocol
Electronic Commerce Research and Applications
Multi-tag and multi-owner RFID ownership transfer in supply chains
Decision Support Systems
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Protocol for ownership transfer across authorities: with the ability to assign transfer target
Security and Communication Networks
Secure multiple group ownership transfer protocol for mobile RFID
Electronic Commerce Research and Applications
Hi-index | 0.00 |
Radio Frequency Identification (RFID) is a technology that allows automatic identification and data capture by using radio frequencies. In 2006, Osaka et al. proposed a RFID security method based on a hash function and a symmetric key cryptosystem. Osaka et al. claimed that their proposed RFID security method achieves the following security requirements such as (1) Indistinguishability, (2) Forward Security, (3) Replay Attack, (4) Tag Killing, and (5) Ownership Transfer. Unlike their claims, the current paper points out two security problems of Osaka et al.'s RFID security method. To mitigate these security breaches, we propose an improved RFID security method.