2007
DOI: 10.4304/jcm.2.6.6-13
|View full text |Cite
|
Sign up to set email alerts
|

A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags

Abstract: <p class="MsoNormal" style="text-align: left; margin: 0cm 0cm 0pt;" align="left"><span class="text"><span style="font-family: ";Arial";,";sans-serif";; font-size: 9pt;">RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate reading device (reader) collecting information about him. To solve these issues, many RFID privacy protecting protocols assume that readers have continuou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 15 publications
0
14
0
Order By: Relevance
“…Secure ownership transfer protocols can be broadly classified as schemes that rely on a trusted intermediary (trusted third party (TTP)) [22,23] and schemes that do not [21,24]. In the former, ownership transfer is achieved based on shared secrets between the TTP, the servers and the tag.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Secure ownership transfer protocols can be broadly classified as schemes that rely on a trusted intermediary (trusted third party (TTP)) [22,23] and schemes that do not [21,24]. In the former, ownership transfer is achieved based on shared secrets between the TTP, the servers and the tag.…”
Section: Related Workmentioning
confidence: 99%
“…Fouldagar and Afifi [24] propose two privacy preserving schemes for ownership transfer based on hash functions and symmetric key cryptographic functions. As noted earlier the use of hash function or keyed encryption functions is not in compliance with EPC C1G2 standard.…”
Section: Related Workmentioning
confidence: 99%
“…While a considerable body of research has been focused on securing tag transactions, only a few consider the concept of delegation like in [15][16][17][18][19]. In this paper, we firstly describe an architecture for a basic RFID delegation protocol and then analyze the security of a recent RFID delegation protocol, which we call SMD (Song Mitchell Delegation) due to name of the authors [15] under this model.…”
Section: Introductionmentioning
confidence: 99%
“…Solutions based on symmetric encryption have also been proposed by Fouladgar and Afifi [15] and Koralalage et al [16]. Finally, one of the most recent protocols in this area is due to Dimitriou [17].…”
Section: Related Workmentioning
confidence: 99%