PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
Protocols for RFID tag/reader authentication
Decision Support Systems
A Secure Communication Protocol for Low-Cost RFID System
CIT '07 Proceedings of the 7th IEEE International Conference on Computer and Information Technology
Two Security Problems of RFID Security Method with Ownership Transfer
NPC '08 Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing
Identifying RFID-embedded objects in pervasive healthcare applications
Decision Support Systems
Enhanced RFID Security Method with Ownership Transfer
CIS '08 Proceedings of the 2008 International Conference on Computational Intelligence and Security - Volume 02
Enhancement of the RFID security method with ownership transfer
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Lightweight authentication protocol for mobile RFID networks
International Journal of Security and Networks
Vulnerabilities in some recently proposed RFID ownership transfer protocols
IEEE Communications Letters
RFID mutual authentication protocols
Decision Support Systems
Scalable RFID security protocols supporting tag ownership transfer
Computer Communications
On the security of the canetti-krawczyk model
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Simultaneous multi-level RFID tag ownership & transfer in health care environments
Decision Support Systems
Journal of Theoretical and Applied Electronic Commerce Research
Supply chain product visibility: Methods, systems and impacts
Expert Systems with Applications: An International Journal
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
In any supply chain, there is a high likelihood for individual objects to change ownership at least once in their lifetime. As RFID tags enter the supply chain, these RFID-tagged objects should ideally be able to seamlessly accommodate ownership transfer issues while also accomplishing their primary intended purpose. Physical ownership transfer does not translate to strict ownership transfer in the presence of RFID tags given the wireless nature of communication with these tags. Moreover, whereas existing protocols implicitly assume a single tag that is owned by a single entity, it is not uncommon to encounter scenarios where tag ownership is shared among multiple entities. A dual of this is the case of an object with multiple tags. We consider ownership transfer scenarios for shared ownership transfer and single object with multiple RFID tags. In the multiple-tagged object case, we consider the possibility where objects gain and lose tags over time. We also present a protocol for simultaneous transfer of ownership of multiple tags between owners. Since ownership transfer without a trusted third party (TTP) is difficult to achieve, we propose a shared ownership sharing protocol and evaluate its properties.