An Efficient and Secure RFID Security Method with Ownership Transfer
Computational Intelligence and Security
Two Security Problems of RFID Security Method with Ownership Transfer
NPC '08 Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing
rfidDOT: RFID delegation and ownership transfer made simple
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Enhancement of the RFID security method with ownership transfer
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols
NETCOM '09 Proceedings of the 2009 First International Conference on Networks & Communications
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
Scalable RFID security protocols supporting tag ownership transfer
Computer Communications
Secure and scalable RFID authentication protocol
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Practical RFID ownership transfer scheme
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Reassignment scheme of an RFID tag’s key for owner transfer
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Reducing time complexity in RFID systems
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
RFID systems allow fast and automatic identification of RFID tags through a wireless channel. Information on product items like name, model, purpose, expiration date, etc., can be easily stored and retrieved from RFID tags attached to items. That is why, in the near future, RFID tags can be an active part of our everyday life when interacting with items around us. Frequently, such items may change hands during their life-cycle. Therefore, beyond RFID identification protocols, there is a need for secure and private ownership transfer protocols in RFID systems. To ensure privacy to tag owners, the keys of tags are usually updated during the ownership transfer process. However, none of the previous proposals takes advantage of this property to improve the system scalability. To the best of our knowledge, we propose the first RFID identification protocol supporting ownership transfer that is secure, private and scalable. Furthermore, our proposal achieves other valuable properties related to ownership transfer, such as controlled delegation and decentralization.