2011
DOI: 10.1016/j.dss.2011.08.002
|View full text |Cite
|
Sign up to set email alerts
|

Multi-tag and multi-owner RFID ownership transfer in supply chains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
14
0
7

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 43 publications
(22 citation statements)
references
References 7 publications
1
14
0
7
Order By: Relevance
“…Similar work has been under taken by Kapoor et al [49] for simultaneous transfer of ownership of multiple tags between multiple owners but it does not address the situation where the previous owner eavesdrops on the communication between the TTP and the new owner to obtain the new secret key thereby continue to have access to the tags even after the ownership has been transferred [33]. Also, in addition to not being EPC compliant due to the use of hash operations and encryption functions, the protocol does not handle the privacy among the shared owners.…”
Section: Related Worksupporting
confidence: 68%
“…Similar work has been under taken by Kapoor et al [49] for simultaneous transfer of ownership of multiple tags between multiple owners but it does not address the situation where the previous owner eavesdrops on the communication between the TTP and the new owner to obtain the new secret key thereby continue to have access to the tags even after the ownership has been transferred [33]. Also, in addition to not being EPC compliant due to the use of hash operations and encryption functions, the protocol does not handle the privacy among the shared owners.…”
Section: Related Worksupporting
confidence: 68%
“…It does not require a trusted third party and therefore differs from the shared ownership transfer protocol described in [10].…”
Section: Our Contributionsmentioning
confidence: 98%
“…Kapoor, Zhou and Piramuthu [10] presented a solution of shared ownership transfer with a TTP. A group of owners share the same authentication…”
Section: Related Workmentioning
confidence: 99%
“…In the model, we only need the secure communication channel during the authentication key exchange. Since the proposed scheme applies symmetric-key based tag authentication, it is impossible to securely update the key with shared secret [7]. The key update of the protocol should be performed outside the control range of the previous owner.…”
Section: Rfid Ownership Transfer Systemsmentioning
confidence: 99%