2018
DOI: 10.1109/access.2018.2842778
|View full text |Cite
|
Sign up to set email alerts
|

Tag Ownership Transfer in Radio Frequency Identification Systems: A Survey of Existing Protocols and Open Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 91 publications
0
6
0
Order By: Relevance
“…As indicated on the right of Figure 3, because the back-end server D j has authority over its own key tree, when tag IDs TID ox 4 , TID ox 5 , and TID ox 6 are transferred to multi-owner sets R j−oy , the owner inserts tag IDs TID windowing problem. As indicated on the right of Figure 3, because the back-end server has authority over its own key tree, when tag IDs 4 , 5 , and 6 are transferred to multi-owner sets − , the owner inserts tag IDs 7 , 8 , and 9 in tag group 3 on the far right, and these IDs are not necessarily the same as the output tag IDs. Lastly, the TTP changes the shared keys of tags 4 , 5 , and 6 under , as shown at the bottom of Figure 3, to a shared management key of tags 7 , 8 , and 9 under .…”
Section: Of 19mentioning
confidence: 99%
See 3 more Smart Citations
“…As indicated on the right of Figure 3, because the back-end server D j has authority over its own key tree, when tag IDs TID ox 4 , TID ox 5 , and TID ox 6 are transferred to multi-owner sets R j−oy , the owner inserts tag IDs TID windowing problem. As indicated on the right of Figure 3, because the back-end server has authority over its own key tree, when tag IDs 4 , 5 , and 6 are transferred to multi-owner sets − , the owner inserts tag IDs 7 , 8 , and 9 in tag group 3 on the far right, and these IDs are not necessarily the same as the output tag IDs. Lastly, the TTP changes the shared keys of tags 4 , 5 , and 6 under , as shown at the bottom of Figure 3, to a shared management key of tags 7 , 8 , and 9 under .…”
Section: Of 19mentioning
confidence: 99%
“…Consumers use RFID tags to obtain product and post-sale information. To facilitate the management of supply chain automation and effectively engage in product ownership transfer [3][4][5][6][7][8][9], products labeled with RFID tags undergo multiple ownership transfers throughout their life cycle from their introduction to the decline stage.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Thus, Chen et al [8] proposed a new protocol for avoiding FS and DAs. However, this method still had problems in terms of backward security (BS), inability of ensuring the privacy of the location, and the WP [9], [27]. Shen et al [11] proposed using Chebyshev polynomials to ensure secure transmission during ownership transfer.…”
Section: Introductionmentioning
confidence: 99%