Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication 2009
DOI: 10.1145/1516241.1516284
|View full text |Cite
|
Sign up to set email alerts
|

Enhancement of the RFID security method with ownership transfer

Abstract: Radio frequency identification (RFID) is one popular technology being deployed for a variety of applications. Privacy and security issues play major roles in the success of RFID applications due to ease with masquerade, eavesdropping, etc. over the insecure channel between the tag and the reader. These security requirements are summarized: indistinguishability, forward security, ownership transfer, and resistance to replay attack and tag killing. Much research has been proposed. Except Osaka et al.'s scheme, n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…The protocol is shown to be vulnerable to tracking and DoS attacks by manipulating the value of the random number sent to the tag [27]. Moreover, in [28], an attacker can add noise to the final message exchange resulting in the tag holding incorrect secret information due to which any subsequent authentication would fail.…”
Section: A Related Workmentioning
confidence: 99%
“…The protocol is shown to be vulnerable to tracking and DoS attacks by manipulating the value of the random number sent to the tag [27]. Moreover, in [28], an attacker can add noise to the final message exchange resulting in the tag holding incorrect secret information due to which any subsequent authentication would fail.…”
Section: A Related Workmentioning
confidence: 99%
“…However, their scheme has been shown to suffer from desynchronization problems [26]. An improvement to address the noise injection problem was introduced in [27]. The authors propose the use of a hash function in order to protect the integrity of the key being transferred.…”
Section: Related Workmentioning
confidence: 99%
“…Chen et al [11] proposed a three phase's one to one tag ownership transfer but the mutual authentication was proven weak against replay attack. Lin et al [12] also proposed a one to one ownership protocol which is weak at DoS and de-synchronization attacks.…”
Section: Related Workmentioning
confidence: 99%