A secure ownership transfer protocol using EPCglobal Gen-2 RFID

被引:0
|
作者
Chin-Ling Chen
Yu-Chung Huang
Jehn-Ruey Jiang
机构
[1] Chaoyang University of Technology,Department of Computer Science and Information Engineering
[2] National Central University,Department of Computer Science and Information Engineering
来源
Telecommunication Systems | 2013年 / 53卷
关键词
Security; EPC; Mutual authentication; Ownership transfer; RFID;
D O I
暂无
中图分类号
学科分类号
摘要
Radio Frequency Identification (RFID) is a relatively new technology. In recent years, it has been shown to be convenient and feasible in many applications. However, there are security issues which need to be addressed. Due to the wireless transmission of the RFID system, malicious people can gain the information in the RFID tags, and the user’s privacy is invaded. Although there have been many protection methods proposed for RFID security, the system has remained vulnerable to various attacks. In this paper, we propose a conforming of the EPCglobal Class 1 Generation 2 standards RFID ownership transfer protocol with provable security. The proposed scheme can resist several attacks and ensure a secure transaction.
引用
收藏
页码:387 / 399
页数:12
相关论文
共 50 条
  • [31] Cryptanalysis and Improvement of RFID Ownership Transfer Protocol
    Chen, Xiuqing
    Zhao, Qiang
    Cao, Tianjie
    Zhai, Jingxuan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 165 - 173
  • [32] RFID ownership transfer protocol based on cloud
    Cao, Tianjie
    Chen, Xiuqing
    Doss, Robin
    Zhai, Jingxuan
    Wise, Lucas J.
    Zhao, Qiang
    COMPUTER NETWORKS, 2016, 105 : 47 - 59
  • [33] EPC Gen2v2 RFID Standard Authentication and Ownership Management Protocol
    Niu, Haifeng
    Taqieddin, Eyad
    Jagannathan, S.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2016, 15 (01) : 137 - 149
  • [34] An Enhanced EPC Gen2v2 RFID Authentication and Ownership Management Protocol
    Taqieddin, Eyad
    Al-Dahoud, Hiba
    Mowafi, Moad
    Banimelhem, Omar
    2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, : 683 - 689
  • [35] An efficient and secure RFID security method with ownership transfer
    Osaka, Kyosuke
    Takagi, Tsuyoshi
    Yamazaki, Kenichi
    Takahashi, Osamu
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1090 - 1095
  • [36] An efficient and secure RFID security method with ownership transfer
    Osaka, Kyosuke
    Takagi, Tsuyoshi
    Yamazaki, Kenichi
    Takahashi, Osamu
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 778 - +
  • [37] A practical approach for enhancing security of EPCglobal RFID Gen2 tag
    Park, Jaemin
    Na, Junchae
    Kim, Minjeong
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, 2007, : 435 - 440
  • [38] RFID Based Verifiable Ownership Transfer Protocol Using Blockchain Technology
    Anandhi, S.
    Anitha, R.
    Venkatasamy, Sureshkumar
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1616 - 1621
  • [39] Comparative Analysis of Tag Estimation Algorithms on RFID EPC Gen-2 Performance
    Ferdous, Arundhoti
    Jeevarathnam, Nanda Gopal
    Uysal, Ismail
    2017 IEEE INTERNATIONAL CONFERENCE ON RFID TECHNOLOGY & APPLICATION (RFID-TA), 2017, : 186 - 190
  • [40] Performance Analysis of RFID Protocols: CDMA Versus the Standard EPC Gen-2
    Vahedi, Ehsan
    Ward, Rabab K.
    Blake, Ian F.
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2014, 11 (04) : 1250 - 1261