A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation
[chapter]
2012
Lecture Notes in Computer Science
To the best of our knowledge, we propose the first RFID identification protocol supporting ownership transfer that is secure, private and scalable. ...
Therefore, beyond RFID identification protocols, there is a need for secure and private ownership transfer protocols in RFID systems. ...
This work was partly supported by the Spanish Ministry of Education through projects TSI2007-65406-C03-01 "E-AEGIS" and CONSOLIDER CSD2007-00004 "ARES", by the Spanish Ministry of Industry, Commerce and ...
doi:10.1007/978-3-642-25286-0_10
fatcat:tlfva3qoyrfkbprmqx3i34462a
Scalable RFID security protocols supporting tag ownership transfer
2011
Computer Communications
We propose a novel scalable RFID authentication protocol based on the scheme presented in [1], that takes constant time to authenticate a tag. ...
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. ...
The protocol has two features supporting scalability; a server takes only O(1) work for tag authentication, and tag delegation is straightforward. ...
doi:10.1016/j.comcom.2010.02.027
fatcat:37k2tce5d5bsnodhqjdikanwoa
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
2007
Journal of Communications
Our protocol also manages tags ownership transfer without threatening the new owner's privacy. ...
To solve these issues, many RFID privacy protecting protocols assume that readers have continuous connectivity with a centralised on-line database in charge of the identification of a certain amount of ...
CONCLUSION In this paper we propose a new lightweight and scalable protocol for delegation and ownership transfer. ...
doi:10.4304/jcm.2.6.6-13
fatcat:72epvqj3lzahzitcfui7ddrupu
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
[chapter]
2006
Lecture Notes in Computer Science
After such an ownership transfer, the new owner should be able to read the tag but the old owner should not. We address these issues through an RFID pseudonym protocol. ...
We show how RFID pseudonyms facilitate the transfer of ownership of RFID tags between mutually distrustful parties. ...
David Molnar was supported by an Intel OCR Fellowship and an NSF Graduate Fellowship. ...
doi:10.1007/11693383_19
fatcat:xitnoqoc6ffafngzsfhwex3cau
SRFID: A hash-based security scheme for low cost RFID systems
2013
Egyptian Informatics Journal
The proposed scheme meets the requirements for tag delegation and secure tag ownership transfer. ...
This paper proposes a new simple, low cost, and scalable security scheme relying on one-way hash functions and synchronized secret information. ...
Tag delegation and ownership transfer The proposed scheme is scalable. It provides tag delegation and ownership transfer in an effective way. ...
doi:10.1016/j.eij.2013.02.001
fatcat:6yxlf6gbuffhxaxopziuqtjomq
Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags
2016
Ad hoc networks
, and (iii), we explain how this can be realized in practice using a protocol that achieves secure ownership transfer and controlled delegation without relying on Trusted Third Parties. ...
We do this by developing and formalizing the notion of a keyevolving RFID system. ...
Finally, our protocol will address the following functional requirements of secure ownership transfer: • Controlled delegation: The current owner maintains ownership and control of the tag but can delegate ...
doi:10.1016/j.adhoc.2015.08.019
fatcat:nv46kqrjbbd3pjo4vrwmqsptwq
Scalable RFID Pseudonym Protocol
2009
2009 Third International Conference on Network and System Security
The proposed scheme also supports tag delegation and ownership transfer in an efficient way. ...
We propose a novel RFID authentication protocol based on the Song-Mitchell protocol [21] , that takes O(1) work to authenticate a tag, and meets the privacy, security and performance requirements identified ...
The protocol has two features supporting scalability; a server takes only O(1) work for tag authentication, and tag delegation is straightforward. ...
doi:10.1109/nss.2009.15
dblp:conf/nss/SongM09
fatcat:wog3cdbvcbdzbby6crunsmuu6y
RFID Applications and Security Review
2021
Computation
Access Control; the second is the Security and Privacy section, whose subsections are Authentication, Privacy, and Ownership Transfer; finally, we present the Discussion section. ...
This paper presents a review of the most cited topics regarding RFID focused on applications, security, and privacy. ...
Acknowledgments: This research was conducted as part of the MSc program in Telematic Engineering at the Universidad del Cauca, Popayán, Colombia, and by the Universidad del Cauca (501100005682). ...
doi:10.3390/computation9060069
fatcat:obj6ws6g3vf2jnjkemwm4zlkqi
Secure RFID Ownership Transfer Protocols
[chapter]
2013
Lecture Notes in Computer Science
In typical RFID ownership transfer protocols, the knowledge of the tag's authentication key proves the ownership. ...
In typical RFID ownership transfer protocols, the knowledge of the tag's authentication key proves the ownership. ...
A scalable authentication protocol which supports the ownership transfer was proposed in [5] . ...
doi:10.1007/978-3-642-38033-4_14
fatcat:6nf3owfl3vhsphkfopvqyxyccu
Secure Group Ownership Transfer Protocol for Tags in RFID System
2014
International Journal of Security and Its Applications
It was proposed a secure group ownership transfer protocol for tags in RFID system to transfer the ownership of multiple tags simultaneously. ...
Our protocol was implemented and simulated. We obtained experimental data including time cost by tag in the procedure of ownership transfer. ...
., proposed a scalable RFID authentication protocol supporting ownership transfer [10] . ...
doi:10.14257/ijsia.2014.8.3.03
fatcat:7u5hgivv4nduna22bv4hx2dr3y
A Privacy Model for RFID Tag Ownership Transfer
2017
Security and Communication Networks
The ownership of RFID tag is often transferred from one owner to another in its life cycle. ...
tags, and to observe tag ownership transfer processes. ...
Acknowledgments This paper is partially supported by the China Postdoctoral Science Foundation (no. 2016M602675) and by the Nature Science Foundation of Sichuan Province Education Department (no. 13ZB0127 ...
doi:10.1155/2017/5084636
fatcat:mkgunak4ijgb7ej56zhv33vspq
rfidDOT
2008
Proceedings of the 4th international conference on Security and privacy in communication netowrks - SecureComm '08
In this work we introduce RFIDDOT, a protocol for secure access, delegation and ownership transfer of tags along with a model for formally defining privacy in such an environment. ...
Thus RFIDDOT achieves a very strong notion of security that is necessary in RFID ownership transfer: forward and backward privacy. ...
RFIDDOT: A PROTOCOL SUITE FOR RFID DELEGATION AND OWNERSHIP TRANSFER The basic protocol 1 for tag-reader interaction is shown in Figure 1 . ...
doi:10.1145/1460877.1460921
dblp:conf/securecomm/Dimitriou08
fatcat:egq6j3xat5ghrj6rhavgct2ski
Security in product lifecycle of IoT devices: A survey
2020
Journal of Network and Computer Applications
Accordingly, certain reviews and surveys have been presented, focusing on disparate IoT-related domains, including IoT security, intrusion detection systems, and emerging technologies. ...
A R T I C L E I N F O Index Terms: Internet of things Product lifecycle Lifecycle phases Security solutions Product lifecycle security Device security A B S T R A C T The Internet of Things (IoT) paradigm ...
Acknowledgment The research leading to this publication is supported by the European Union's Horizon 2020 research and innovation program (bIoTope; grant 688203 and FINEST TWINS; grant 856602) and Academy ...
doi:10.1016/j.jnca.2020.102779
fatcat:junhktapajc75px3n2x6j7tzou
Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things
2013
Journal of Cyber Security and Mobility
It ispromising to make an authentication and access control attack resistant andlightweight in a resource constrained and distributed IoT environment.This paper presents the Identity Authentication and ...
Capability basedAccess Control (IACAC) model with protocol evaluation and performanceanalysis. ...
XACML includes an XACML delegation profile in order to support administrative and dynamic delegation. ...
doi:10.13052/jcsm2245-1439.142
fatcat:xxer6rdhr5crjh2227vpsw2f4i
Leveraging the Internet of Things and Blockchain Technology in Supply Chain Management
2019
Future Internet
., scalability, security, immutability and auditing, information flows, traceability and interoperability, quality) and thus lay the foundation for future research projects. ...
Modern supply chains have evolved into highly complex value networks and turned into a vital source of competitive advantage. ...
and trustworthiness), and data monetization (transfer of the ownership of data and exchange in a universal data marketplace) [128] . ...
doi:10.3390/fi11070161
fatcat:5olv7hclhbckjmawkd2mo7wmye
« Previous
Showing results 1 — 15 out of 262 results