On Group Ownership Delegate Protocol for RFID Systems

被引:4
|
作者
Tu, Yu-Ju [1 ]
Kapoor, Gaurav [2 ]
Piramuthu, Selwyn [3 ]
机构
[1] Natl Chengchi Univ, Management Informat Syst, Taipei, Taiwan
[2] Singapore Inst Technol, Infocomm Technol, Singapore, Singapore
[3] Univ Florida, Informat Syst & Operat Management, Gainesville, FL 32611 USA
关键词
RFID; group ownership transfer; authentication; vulnerabilities;
D O I
10.1007/s10796-021-10177-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As RFID tags identify objects at the item level, proper authentication of these tags is of paramount importance in RFID-based systems. While RFID tag authentication in systems where these tags are assigned to be read by a single reader is challenging enough due to resource constraints related to memory and processing power at the tag's side, it is not uncommon for RFID tags to be read by multiple readers. Even more, when an item moves between owners, ownership of the RFID tagged item needs to be updated to reflect reality. As authentication protocols play a critical role in RFID-based systems, it is necessary to ensure that any developed protocol is free from vulnerabilities that can be taken advantage by an adversary to mount attacks on the system. Lee et al. (Information Systems Frontiers, 21, 1153-1166, 2019) develop group ownership authentication protocols for a group of RFID-tagged items that simultaneously switch ownership. We evaluate the protocols in Lee et al. (Information Systems Frontiers, 21, 1153-1166, 2019) and identify several critical vulnerabilities. We then discuss the sources of these vulnerabilities and common precautions that should be taken to avoid such vulnerabilities.
引用
下载
收藏
页码:1577 / 1584
页数:8
相关论文
共 50 条
  • [21] New authentication/ownership transfer protocol for RFID objects
    Aghili, Seyed Farhad
    Mala, Hamid
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [22] Untraceable Analysis of Lightweight RFID Ownership Transfer Protocol
    Chen, Xiuqing
    Cao, Tianjie
    Zhai, Jingxuan
    Guo, Yu
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (08): : 199 - 212
  • [23] Analysis and Design of RFID Tag Ownership Transfer Protocol
    Wang Shaohui
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 352 - 355
  • [24] Analysis and Design of RFID Tag Ownership Transfer Protocol
    Wang Shaohui
    PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 229 - 236
  • [25] A Novel Authentication Protocol Enabling RFID Tags Ownership Transfer
    Wang, Hong
    Yang, Xiaolong
    Huang, Qiong
    Long, Keping
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 855 - 860
  • [26] RFID tag ownership transfer protocol with backtracking authorization ability
    He, L., 1600, Asian Network for Scientific Information (12):
  • [27] AN OWNERSHIP SHARING PROTOCOL FOR RFID WITHOUT A TRUSTED THIRD PARTY
    Kapoor, Gaurav
    Piramuthu, Selwyn
    ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 28 - 30
  • [28] Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol
    Moriyama, Daisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (01) : 130 - 138
  • [29] Protocol for Simultaneous Ownership Transfer of Multiple RFID Tags with TTP
    Zhou, Wei
    Piramuthu, Selwyn
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 150 - +
  • [30] RFID Tag Ownership Transfer Protocol for A Closed Loop System
    Al Gaith, K. D.
    Ray, Biplob Rakshit
    Chowdhury, Morshed
    2014 IIAI 3RD INTERNATIONAL CONFERENCE ON ADVANCED APPLIED INFORMATICS (IIAI-AAI 2014), 2014, : 575 - 579