RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Privacy threats and issues in mobile RFID
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Proceedings of the 2007 ACM symposium on Applied computing
Grain: a stream cipher for constrained environments
International Journal of Wireless and Mobile Computing
Electronic Commerce Research and Applications
Two Security Problems of RFID Security Method with Ownership Transfer
NPC '08 Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing
Enhancement of the RFID security method with ownership transfer
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Defining strong privacy for RFID
ACM Transactions on Information and System Security (TISSEC)
A New RFID Authentication Protocol with Ownership Transfer in an Insecure Communication Environment
HIS '09 Proceedings of the 2009 Ninth International Conference on Hybrid Intelligent Systems - Volume 01
Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags
HICSS '10 Proceedings of the 2010 43rd Hawaii International Conference on System Sciences
Controlled delegation protocol in mobile RFID networks
EURASIP Journal on Wireless Communications and Networking
A case against currently used hash functions in RFID protocols
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Secure multiple group ownership transfer protocol for mobile RFID
Electronic Commerce Research and Applications
Journal of Theoretical and Applied Electronic Commerce Research
Hi-index | 0.00 |
With the combination of mobile devices and readers in recent years, mobile RFID systems have been widely deployed in mobile identification and its further applications. E-commerce has applied many mobile RFID services, including the transfer of a tagged item's ownership. To secure such transfer in a mobile RFID environment, we propose a new ownership transfer protocol across different authorities. We prove that it is able to withstand most threats for RFID and prevent denial of service attacks that arise in the presence of asynchrony. It can also guarantee forward and backward secrecy, and circumvent the windowing problem. This scheme is designed for lightweight tags and has been proved to be viable for use in low-cost passive tags. It also offers better performance than any other known ownership transfer schemes.