Abstract
In RFID system a tag is attached to an object which might own by a number of owners during its life time. This requires the RFID system to transfer ownership of the tag to its new owner. The ownership transfer has to protect privacy of current and new owner. Many ownership tag ownership transfer exists in the literature, however, most of them are impractical or insecure to implement on current passive RFID tags. We are proposing a timer based ownership transfer protocol for closed loop RFID systems. The proposal in this paper includes two implement scenario to cover diverse tags type. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.
Article PDF
Avoid common mistakes on your manuscript.
References
Pateriya & Sharma, (2011), “the Evolution of RFID Security and Privacy: A Research Survey”, International Conference on Communication and Network Technologies.
Syamsuddin, Han and Dillon,(2012), “A Survey on Low- cost RFID Authentication Protocols”, ICACSIS.
Ray, BR, Chowdhury, M & Abawajy, J 2012, ‘Secure mobile RFID ownership transfer protocol to cover all transfer scenarios’, in Computing and Convergence Technology (ICCCT), 2012 7th International Conference on, pp. 1185–92.
Doss, R & Wanlei, Z (2012), ”A secure tag ownership transfer scheme in a closed loop RFID system”, in Wireless Communications and Networking Conference Workshops (WCNCW), IEEE.
Qiang Tang & Chen, (2005), “Weaknesses in two groupsDiffie-Hellman Key exchange protocols”.
K.Osaka, T. Takagi, K. Yamazaki, and O.Takahashi, “An Efficient and secure RFID Security Method with Ownership Transfer”, in 2006 International Conference on Computational Intelligence and Security. Ieee, Nov.2006, pp. 1090–1095.
C.-H. Wang and S. Chin, “A new RFID authentication protocol with ownership transfer in an insecure communication environment”, in proc. Of 9th International Conference on Hybrid Intelligent Systems, 2009.
P.Japinnen and H. Hamalainen, “Enhanced RFID security method with ownership transfer”, in proc. Of International Conference on computational Intelligence and Security, 2008.
B. Song and C.J. Mitchell, “Scalable RFID security protocols supporting tag ownership transfer”, Computer Communications, vol. 34, no. 4, pp. 556–566, Apr. 2011.
G. Kapoor and S. Piramuthu, “Vulnerabilities in some recently proposed RFID ownership transfer protocols”, IEEE Communications Letters, vol. 14, no. 3, pp. 260–262, Mar. 2010.
H. Chen, W.Lee, Y. Zhao, and Y.Chen, “Enhancement of the RFID Security Method with Ownership Transfer”, in ICUIMC, 2009.
I.C. Lin, C.W. Yang, S.-C. Tsaur(2010), Non-identifiable RFID Privacy protection with ownership transfer, International Journal of Innovative Computing, Information, and Control.
D. Zhou and T.H. Lai, “A Compatible and Scalable Clock Synchronization Protocol in IEEE 802.11 ad Hoc Networks, “in the Proceedings of the 2005 International Conference on Parallel Processing.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
About this article
Cite this article
Al., G.K.D., Ray, B.R. & Chowdhury, M. Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System. Int J Netw Distrib Comput 3, 128–136 (2015). https://doi.org/10.2991/ijndc.2015.3.2.7
Published:
Issue Date:
DOI: https://doi.org/10.2991/ijndc.2015.3.2.7