Filters








262 Hits in 5.8 sec

A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation [chapter]

Albert Fernàndez-Mir, Rolando Trujillo-Rasua, Jordi Castellà-Roca, Josep Domingo-Ferrer
2012 Lecture Notes in Computer Science  
To the best of our knowledge, we propose the first RFID identification protocol supporting ownership transfer that is secure, private and scalable.  ...  Therefore, beyond RFID identification protocols, there is a need for secure and private ownership transfer protocols in RFID systems.  ...  This work was partly supported by the Spanish Ministry of Education through projects TSI2007-65406-C03-01 "E-AEGIS" and CONSOLIDER CSD2007-00004 "ARES", by the Spanish Ministry of Industry, Commerce and  ... 
doi:10.1007/978-3-642-25286-0_10 fatcat:tlfva3qoyrfkbprmqx3i34462a

Scalable RFID security protocols supporting tag ownership transfer

Boyeon Song, Chris J. Mitchell
2011 Computer Communications  
We propose a novel scalable RFID authentication protocol based on the scheme presented in [1], that takes constant time to authenticate a tag.  ...  We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer.  ...  The protocol has two features supporting scalability; a server takes only O(1) work for tag authentication, and tag delegation is straightforward.  ... 
doi:10.1016/j.comcom.2010.02.027 fatcat:37k2tce5d5bsnodhqjdikanwoa

A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags

Sepideh Fouladgar, Hossam Afifi
2007 Journal of Communications  
Our protocol also manages tags ownership transfer without threatening the new owner's privacy.  ...  To solve these issues, many RFID privacy protecting protocols assume that readers have continuous connectivity with a centralised on-line database in charge of the identification of a certain amount of  ...  CONCLUSION In this paper we propose a new lightweight and scalable protocol for delegation and ownership transfer.  ... 
doi:10.4304/jcm.2.6.6-13 fatcat:72epvqj3lzahzitcfui7ddrupu

A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags [chapter]

David Molnar, Andrea Soppera, David Wagner
2006 Lecture Notes in Computer Science  
After such an ownership transfer, the new owner should be able to read the tag but the old owner should not. We address these issues through an RFID pseudonym protocol.  ...  We show how RFID pseudonyms facilitate the transfer of ownership of RFID tags between mutually distrustful parties.  ...  David Molnar was supported by an Intel OCR Fellowship and an NSF Graduate Fellowship.  ... 
doi:10.1007/11693383_19 fatcat:xitnoqoc6ffafngzsfhwex3cau

SRFID: A hash-based security scheme for low cost RFID systems

Walid I. Khedr
2013 Egyptian Informatics Journal  
The proposed scheme meets the requirements for tag delegation and secure tag ownership transfer.  ...  This paper proposes a new simple, low cost, and scalable security scheme relying on one-way hash functions and synchronized secret information.  ...  Tag delegation and ownership transfer The proposed scheme is scalable. It provides tag delegation and ownership transfer in an effective way.  ... 
doi:10.1016/j.eij.2013.02.001 fatcat:6yxlf6gbuffhxaxopziuqtjomq

Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags

Tassos Dimitriou
2016 Ad hoc networks  
, and (iii), we explain how this can be realized in practice using a protocol that achieves secure ownership transfer and controlled delegation without relying on Trusted Third Parties.  ...  We do this by developing and formalizing the notion of a keyevolving RFID system.  ...  Finally, our protocol will address the following functional requirements of secure ownership transfer: • Controlled delegation: The current owner maintains ownership and control of the tag but can delegate  ... 
doi:10.1016/j.adhoc.2015.08.019 fatcat:nv46kqrjbbd3pjo4vrwmqsptwq

Scalable RFID Pseudonym Protocol

Boyeon Song, Chris J. Mitchell
2009 2009 Third International Conference on Network and System Security  
The proposed scheme also supports tag delegation and ownership transfer in an efficient way.  ...  We propose a novel RFID authentication protocol based on the Song-Mitchell protocol [21] , that takes O(1) work to authenticate a tag, and meets the privacy, security and performance requirements identified  ...  The protocol has two features supporting scalability; a server takes only O(1) work for tag authentication, and tag delegation is straightforward.  ... 
doi:10.1109/nss.2009.15 dblp:conf/nss/SongM09 fatcat:wog3cdbvcbdzbby6crunsmuu6y

RFID Applications and Security Review

Cesar Munoz-Ausecha, Juan Ruiz-Rosero, Gustavo Ramirez-Gonzalez
2021 Computation  
Access Control; the second is the Security and Privacy section, whose subsections are Authentication, Privacy, and Ownership Transfer; finally, we present the Discussion section.  ...  This paper presents a review of the most cited topics regarding RFID focused on applications, security, and privacy.  ...  Acknowledgments: This research was conducted as part of the MSc program in Telematic Engineering at the Universidad del Cauca, Popayán, Colombia, and by the Universidad del Cauca (501100005682).  ... 
doi:10.3390/computation9060069 fatcat:obj6ws6g3vf2jnjkemwm4zlkqi

Secure RFID Ownership Transfer Protocols [chapter]

Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan
2013 Lecture Notes in Computer Science  
In typical RFID ownership transfer protocols, the knowledge of the tag's authentication key proves the ownership.  ...  In typical RFID ownership transfer protocols, the knowledge of the tag's authentication key proves the ownership.  ...  A scalable authentication protocol which supports the ownership transfer was proposed in [5] .  ... 
doi:10.1007/978-3-642-38033-4_14 fatcat:6nf3owfl3vhsphkfopvqyxyccu

Secure Group Ownership Transfer Protocol for Tags in RFID System

Lei He, Yong Gan, Yi-feng Yin
2014 International Journal of Security and Its Applications  
It was proposed a secure group ownership transfer protocol for tags in RFID system to transfer the ownership of multiple tags simultaneously.  ...  Our protocol was implemented and simulated. We obtained experimental data including time cost by tag in the procedure of ownership transfer.  ...  ., proposed a scalable RFID authentication protocol supporting ownership transfer [10] .  ... 
doi:10.14257/ijsia.2014.8.3.03 fatcat:7u5hgivv4nduna22bv4hx2dr3y

A Privacy Model for RFID Tag Ownership Transfer

Xingchun Yang, Chunxiang Xu, Chaorong Li
2017 Security and Communication Networks  
The ownership of RFID tag is often transferred from one owner to another in its life cycle.  ...  tags, and to observe tag ownership transfer processes.  ...  Acknowledgments This paper is partially supported by the China Postdoctoral Science Foundation (no. 2016M602675) and by the Nature Science Foundation of Sichuan Province Education Department (no. 13ZB0127  ... 
doi:10.1155/2017/5084636 fatcat:mkgunak4ijgb7ej56zhv33vspq

rfidDOT

Tassos Dimitriou
2008 Proceedings of the 4th international conference on Security and privacy in communication netowrks - SecureComm '08  
In this work we introduce RFIDDOT, a protocol for secure access, delegation and ownership transfer of tags along with a model for formally defining privacy in such an environment.  ...  Thus RFIDDOT achieves a very strong notion of security that is necessary in RFID ownership transfer: forward and backward privacy.  ...  RFIDDOT: A PROTOCOL SUITE FOR RFID DELEGATION AND OWNERSHIP TRANSFER The basic protocol 1 for tag-reader interaction is shown in Figure 1 .  ... 
doi:10.1145/1460877.1460921 dblp:conf/securecomm/Dimitriou08 fatcat:egq6j3xat5ghrj6rhavgct2ski

Security in product lifecycle of IoT devices: A survey

Narges Yousefnezhad, Avleen Malhi, Kary Främling
2020 Journal of Network and Computer Applications  
Accordingly, certain reviews and surveys have been presented, focusing on disparate IoT-related domains, including IoT security, intrusion detection systems, and emerging technologies.  ...  A R T I C L E I N F O Index Terms: Internet of things Product lifecycle Lifecycle phases Security solutions Product lifecycle security Device security A B S T R A C T The Internet of Things (IoT) paradigm  ...  Acknowledgment The research leading to this publication is supported by the European Union's Horizon 2020 research and innovation program (bIoTope; grant 688203 and FINEST TWINS; grant 856602) and Academy  ... 
doi:10.1016/j.jnca.2020.102779 fatcat:junhktapajc75px3n2x6j7tzou

Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

Parikshit N. Mahalle, Bayu Anggorojati, Neeli R. Prasad, Ramjee Prasad
2013 Journal of Cyber Security and Mobility  
It ispromising to make an authentication and access control attack resistant andlightweight in a resource constrained and distributed IoT environment.This paper presents the Identity Authentication and  ...  Capability basedAccess Control (IACAC) model with protocol evaluation and performanceanalysis.  ...  XACML includes an XACML delegation profile in order to support administrative and dynamic delegation.  ... 
doi:10.13052/jcsm2245-1439.142 fatcat:xxer6rdhr5crjh2227vpsw2f4i

Leveraging the Internet of Things and Blockchain Technology in Supply Chain Management

Abderahman Rejeb, John G. Keogh, Horst Treiblmaier
2019 Future Internet  
., scalability, security, immutability and auditing, information flows, traceability and interoperability, quality) and thus lay the foundation for future research projects.  ...  Modern supply chains have evolved into highly complex value networks and turned into a vital source of competitive advantage.  ...  and trustworthiness), and data monetization (transfer of the ownership of data and exchange in a universal data marketplace) [128] .  ... 
doi:10.3390/fi11070161 fatcat:5olv7hclhbckjmawkd2mo7wmye
« Previous Showing results 1 — 15 out of 262 results