A Privacy Model for RFID Tag Ownership Transfer

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RFID Tag Ownership Transfer

In some applications, the bearer of a radio frequency identification (RFID) tag might change, with corresponding changes required in the RFID system infrastructure. We survey the security requirements for RFID tag ownership transfer, and propose novel authentication protocols for tag ownership and authorisation transfer. The proposed protocols satisfy most of the requirements that we present, a...

متن کامل

Vulnerability analysis of RFID protocols for tag ownership transfer

1389-1286/$ see front matter 2009 Elsevier B.V doi:10.1016/j.comnet.2009.11.007 * Corresponding author. E-mail addresses: [email protected] (P. P inf.uc3m.es (J.C. Hernandez-Castro), [email protected] dor), [email protected] (T. Li), [email protected] URL: http://www.lightweightcryptography.com In RFIDSec’08, Song proposed an ownership transfer scheme, which consists of an ownership tran...

متن کامل

Scalable RFID security protocols supporting tag ownership transfer

We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously proposed protocols suffer from scalability issues because they require a linear search to identify or authenticate a tag. In support of scalability, some RFID protocols, however, only require constant time for tag identifica...

متن کامل

RFID Tag Ownership Transfer Protocol with Retrospective Ability

Tag ownership transfer is an important process for RFID system. Besides the user needs to obtain the information concerning the quality of products in some scenarios, which are attached by tags. In this paper, we proposed an ownership transfer protocol with retrospective ability and analyzed its security level by using GNY logic. The results indicate that the ownership transfer protocol provide...

متن کامل

Tag Broker Model for Protecting Privacy in RFID Environment

RFID system, in which we give identification number to each item and detect it with radio frequency, supports more variable service than barcode system can do. For example, a refrigerator with RFID reader and internet connection will automatically notify expiration of food validity to us. But, in spite of its convenience, RFID system has some security threats, because anybody can get ID informa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2017

ISSN: 1939-0114,1939-0122

DOI: 10.1155/2017/5084636