RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Privacy threats and issues in mobile RFID
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Proceedings of the 2007 ACM symposium on Applied computing
Grain: a stream cipher for constrained environments
International Journal of Wireless and Mobile Computing
Computation-Efficient Multicast Key Distribution
IEEE Transactions on Parallel and Distributed Systems
Two Security Problems of RFID Security Method with Ownership Transfer
NPC '08 Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing
Enhancement of the RFID security method with ownership transfer
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
A New RFID Authentication Protocol with Ownership Transfer in an Insecure Communication Environment
HIS '09 Proceedings of the 2009 Ninth International Conference on Hybrid Intelligent Systems - Volume 01
Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags
HICSS '10 Proceedings of the 2010 43rd Hawaii International Conference on System Sciences
A case against currently used hash functions in RFID protocols
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Secure multiple group ownership transfer protocol for mobile RFID
Electronic Commerce Research and Applications
Hi-index | 0.00 |
Radio Frequency Identification (RFID) has been widely deployed for its high capabilities in simple computation, storage, long scan distance, and simultaneous reading. With the combination of mobile devices and readers in recent years, it has been transformed to mobile RFID providing wider services for its users and mobility for its readers. E-commerce, for instance, has applied many of mobile RFID's deriving services, one of which is the transfer of a tagged item's ownership. To secure such transfer in a mobile RFID environment, we propose a new approach for ownership transfer across different authorities and prove it able to stand most threats for RFID and to prevent Denial of Service (DoS) attacks that derive from asynchrony. Another contribution in this paper is that we can assign transfer targets, which, except our scheme, can only be achieved by Yang et al.'s Cross Authority Ownership Transfer (CAOT) protocol. That scheme, however, involves heavy computation and is not suitable for lightweight tags, whereas this scheme is designed for lightweight tags and has been proved viable on low-cost passive tags and has better performance than any known ownership transfer schemes. Copyright © 2011 John Wiley & Sons, Ltd. (This work was supported in part by National Science Council under the grants NSC-99-2219-E-033-001-, and by Chung Yuan Christian University under the grants CYCU-EECS.9801.)