2014
DOI: 10.1002/sec.965
|View full text |Cite
|
Sign up to set email alerts
|

TOA: a tag‐owner‐assisting RFID authentication protocol toward access control and ownership transfer

Abstract: This paper addresses radio frequency identification (RFID) authentication and ownership transfer in offline scenarios. Four typical related works are reviewed in detail. A series of shortcomings and vulnerabilities of them are pointed out. A new RFID authentication protocol based on a novel tag-owner-assisting architecture is proposed, making a tag's owner an essential participant of the RFID authentication process. The proposed protocol is distinguished from existing works in providing ownership transfer, acc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…This access control can be performed by applying frameworks to stop unauthorized readers from accessing tags that could result in unauthorized access to stored information [166]. In the same way, when the access needs to be limited to the right stakeholders and systems, different methods have been investigated, for example, asymmetric keys for mutual authentication [167], digital signature systems [168], role-based access applied to the readers [169], or using protocols based on the ownership of the tags [170]. In the past, systems have been breached, such as the case of the cloning of MiFare Passes [171].…”
Section: Access Controlmentioning
confidence: 99%
“…This access control can be performed by applying frameworks to stop unauthorized readers from accessing tags that could result in unauthorized access to stored information [166]. In the same way, when the access needs to be limited to the right stakeholders and systems, different methods have been investigated, for example, asymmetric keys for mutual authentication [167], digital signature systems [168], role-based access applied to the readers [169], or using protocols based on the ownership of the tags [170]. In the past, systems have been breached, such as the case of the cloning of MiFare Passes [171].…”
Section: Access Controlmentioning
confidence: 99%