2009
DOI: 10.1007/978-3-642-04444-1_39
|View full text |Cite
|
Sign up to set email alerts
|

Secure Ownership and Ownership Transfer in RFID Systems

Abstract: Abstract. We present a formal model for stateful security protocols. This model is used to define ownership and ownership transfer as concepts as well as security properties. These definitions are based on an intuitive notion of ownership related to physical ownership. They are aimed at RFID systems, but should be applicable to any scenario sharing the same intuition of ownership. We discuss the connection between ownership and the notion of desynchronization resistance and give the first formal definition of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(19 citation statements)
references
References 16 publications
(19 reference statements)
0
19
0
Order By: Relevance
“…Deursen, Mauw, Radomirović and Vullers [3] introduced a formal definition of secure ownership transfer in RFID systems. They described two roles: the tag owner and the tag holder.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Deursen, Mauw, Radomirović and Vullers [3] introduced a formal definition of secure ownership transfer in RFID systems. They described two roles: the tag owner and the tag holder.…”
Section: Related Workmentioning
confidence: 99%
“…The security of RFID ownership transfer protocols is considered in threefold: the secure ownership, exclusive ownership and secure ownership transfer [3]. The first two are related to the phase of the ownership verification.…”
Section: Introductionmentioning
confidence: 99%
“…for any form of analytics, authentication and possession are decoupled. Also as pointed out in [13] these protocols still suffer from security flaws.…”
Section: Authentication Using Rfidmentioning
confidence: 99%
“…Most protocols have been broken in [13]. We extend the concept of ownership verification to verification after possession of the item.…”
Section: Related Workmentioning
confidence: 99%
“…We say that a protocol P is desynchronization resistant, if a tag never loses all its owners with respect to P [7]. It ensures that the protocol can always be executed successfully with a tag.…”
Section: Introductionmentioning
confidence: 99%