2014 IEEE 28th International Conference on Advanced Information Networking and Applications 2014
DOI: 10.1109/aina.2014.149
|View full text |Cite
|
Sign up to set email alerts
|

A Scalable and Secure RFID Ownership Transfer Protocol

Abstract: Ownership transfer in an RFID inventory system experiences many security and privacy oriented problems. We consider scenarios related to ownership transfer of RFID tags in a large inventory system. In this paper, we propose a new mutual authentication protocol from Ring LPN problem that leverages the reader authentication phase to incorporate Semi-Trusted Parties (STP) seamlessly in RFID ownership transfer protocol. Employing STPs could ease the ownership transfer process for the consumers in the remote locati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Mamun et al propose a scalable RFID ownership transfer protocol based on a lightweight Field-LPN problem [16]. The protocol adopts the homomorphic aggregated signature to facilitate transferring ownership of a set of tags together.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…Mamun et al propose a scalable RFID ownership transfer protocol based on a lightweight Field-LPN problem [16]. The protocol adopts the homomorphic aggregated signature to facilitate transferring ownership of a set of tags together.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…Moreover, the security requirements of an RFID ownership transfer protocol,() where the ownership of a tag needs to be transferred securely, are very close to that of path authentication protocols. () However, in comparison with the ownership transfer protocol, the path authentication protocol demands additional privacy requirements such as forward privacy , where former executions must not be traced by the current owner, and backward privacy , where the succeeding transaction should not be traced by the former owner …”
Section: Introductionmentioning
confidence: 99%