A Privacy Model for RFID Tag Ownership Transfer
نویسندگان
چکیده
منابع مشابه
RFID Tag Ownership Transfer
In some applications, the bearer of a radio frequency identification (RFID) tag might change, with corresponding changes required in the RFID system infrastructure. We survey the security requirements for RFID tag ownership transfer, and propose novel authentication protocols for tag ownership and authorisation transfer. The proposed protocols satisfy most of the requirements that we present, a...
متن کاملVulnerability analysis of RFID protocols for tag ownership transfer
1389-1286/$ see front matter 2009 Elsevier B.V doi:10.1016/j.comnet.2009.11.007 * Corresponding author. E-mail addresses: [email protected] (P. P inf.uc3m.es (J.C. Hernandez-Castro), [email protected] dor), [email protected] (T. Li), [email protected] URL: http://www.lightweightcryptography.com In RFIDSec’08, Song proposed an ownership transfer scheme, which consists of an ownership tran...
متن کاملScalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously proposed protocols suffer from scalability issues because they require a linear search to identify or authenticate a tag. In support of scalability, some RFID protocols, however, only require constant time for tag identifica...
متن کاملRFID Tag Ownership Transfer Protocol with Retrospective Ability
Tag ownership transfer is an important process for RFID system. Besides the user needs to obtain the information concerning the quality of products in some scenarios, which are attached by tags. In this paper, we proposed an ownership transfer protocol with retrospective ability and analyzed its security level by using GNY logic. The results indicate that the ownership transfer protocol provide...
متن کاملTag Broker Model for Protecting Privacy in RFID Environment
RFID system, in which we give identification number to each item and detect it with radio frequency, supports more variable service than barcode system can do. For example, a refrigerator with RFID reader and internet connection will automatically notify expiration of food validity to us. But, in spite of its convenience, RFID system has some security threats, because anybody can get ID informa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2017
ISSN: 1939-0114,1939-0122
DOI: 10.1155/2017/5084636