On Group Ownership Delegate Protocol for RFID Systems

被引:4
|
作者
Tu, Yu-Ju [1 ]
Kapoor, Gaurav [2 ]
Piramuthu, Selwyn [3 ]
机构
[1] Natl Chengchi Univ, Management Informat Syst, Taipei, Taiwan
[2] Singapore Inst Technol, Infocomm Technol, Singapore, Singapore
[3] Univ Florida, Informat Syst & Operat Management, Gainesville, FL 32611 USA
关键词
RFID; group ownership transfer; authentication; vulnerabilities;
D O I
10.1007/s10796-021-10177-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As RFID tags identify objects at the item level, proper authentication of these tags is of paramount importance in RFID-based systems. While RFID tag authentication in systems where these tags are assigned to be read by a single reader is challenging enough due to resource constraints related to memory and processing power at the tag's side, it is not uncommon for RFID tags to be read by multiple readers. Even more, when an item moves between owners, ownership of the RFID tagged item needs to be updated to reflect reality. As authentication protocols play a critical role in RFID-based systems, it is necessary to ensure that any developed protocol is free from vulnerabilities that can be taken advantage by an adversary to mount attacks on the system. Lee et al. (Information Systems Frontiers, 21, 1153-1166, 2019) develop group ownership authentication protocols for a group of RFID-tagged items that simultaneously switch ownership. We evaluate the protocols in Lee et al. (Information Systems Frontiers, 21, 1153-1166, 2019) and identify several critical vulnerabilities. We then discuss the sources of these vulnerabilities and common precautions that should be taken to avoid such vulnerabilities.
引用
下载
收藏
页码:1577 / 1584
页数:8
相关论文
共 50 条
  • [31] A secure rfid authentication and ownership transfer protocol in serverless environment
    Lin, Iuon-Chang
    Hsu, Hung-Huei
    ICIC Express Letters, 2012, 6 (06): : 1429 - 1433
  • [32] RFID Multi-Ownership Transfer Protocol in VMI Environments
    Lo, Nai-Wei
    Wang, I-Fan
    Chuang, Yo-Hsuan
    RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY, 2014, 12 : 51 - 66
  • [33] An efficient RFID authentication protocol supporting tag ownership transfer
    Jialiang, He
    Dantong, Ouyang
    Youjun, Xu
    Yu, Shang
    International Journal of Advancements in Computing Technology, 2012, 4 (04) : 244 - 253
  • [34] Security enhancement on an RFID ownership transfer protocol based on cloud
    Lee, Cheng-Chi
    Chen, Shun-Der
    Li, Chun-Ta
    Cheng, Chung-Lun
    Lai, Yan-Ming
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 266 - 277
  • [35] AN EFFICIENT REDUNDANT INFORMATION COLLECTION PROTOCOL FOR THE GROUP INTEGRITY OF TAGS IN RFID SYSTEMS
    Alkanhel, Reem
    Ambroze, Marcel
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2020, 13 (01): : 13 - 26
  • [36] PUF-based Anonymous RFID system Ownership Transfer Protocol
    Sun, Ziwen
    Wei, Min
    PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, : 6367 - 6373
  • [37] A Secure Partial RFID Ownership Transfer Protocol with Multi-Owners
    Luo, Jia-Ning
    Yang, Ming-Hour
    SENSORS, 2020, 20 (01)
  • [38] PUF-based RFID Ownership Transfer Protocol in an Open Environment
    Li, Qing-Shan
    Xu, Xiao-Lin
    Chen, Zhong
    2014 15TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT 2014), 2014, : 131 - 137
  • [39] A New RFID Authentication Protocol with Ownership Transfer in an Insecure Communication Environment
    Wang, Chih-Hung
    Chin, Shan
    HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 1, PROCEEDINGS, 2009, : 486 - 491
  • [40] A Secure and Practical RFID Ownership Transfer Protocol Based on Chebyshev Polynomials
    Shen, Zuming
    Zeng, Peng
    Qian, Yuyin
    Choo, Kim-Kwang Raymond
    IEEE ACCESS, 2018, 6 : 14560 - 14566