On Group Ownership Delegate Protocol for RFID Systems

被引:4
|
作者
Tu, Yu-Ju [1 ]
Kapoor, Gaurav [2 ]
Piramuthu, Selwyn [3 ]
机构
[1] Natl Chengchi Univ, Management Informat Syst, Taipei, Taiwan
[2] Singapore Inst Technol, Infocomm Technol, Singapore, Singapore
[3] Univ Florida, Informat Syst & Operat Management, Gainesville, FL 32611 USA
关键词
RFID; group ownership transfer; authentication; vulnerabilities;
D O I
10.1007/s10796-021-10177-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As RFID tags identify objects at the item level, proper authentication of these tags is of paramount importance in RFID-based systems. While RFID tag authentication in systems where these tags are assigned to be read by a single reader is challenging enough due to resource constraints related to memory and processing power at the tag's side, it is not uncommon for RFID tags to be read by multiple readers. Even more, when an item moves between owners, ownership of the RFID tagged item needs to be updated to reflect reality. As authentication protocols play a critical role in RFID-based systems, it is necessary to ensure that any developed protocol is free from vulnerabilities that can be taken advantage by an adversary to mount attacks on the system. Lee et al. (Information Systems Frontiers, 21, 1153-1166, 2019) develop group ownership authentication protocols for a group of RFID-tagged items that simultaneously switch ownership. We evaluate the protocols in Lee et al. (Information Systems Frontiers, 21, 1153-1166, 2019) and identify several critical vulnerabilities. We then discuss the sources of these vulnerabilities and common precautions that should be taken to avoid such vulnerabilities.
引用
下载
收藏
页码:1577 / 1584
页数:8
相关论文
共 50 条
  • [41] Lightweight Mutual Authentication and Ownership Transfer for RFID Systems
    Kulseng, Lars
    Yu, Zhen
    Wei, Yawen
    Guan, Yong
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [42] Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System
    Al, Gaith K. D.
    Ray, Biplob Rakshit
    Chowdhury, Morshed
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2015, 3 (02) : 128 - 136
  • [43] RFID Based Verifiable Ownership Transfer Protocol Using Blockchain Technology
    Anandhi, S.
    Anitha, R.
    Venkatasamy, Sureshkumar
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1616 - 1621
  • [44] A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation
    Fernandez-Mir, Albert
    Trujillo-Rasua, Rolando
    Castella-Roca, Jordi
    Domingo-Ferrer, Josep
    RFID SECURITY AND PRIVACY, 2012, 7055 : 147 - 162
  • [45] Scenarios for an RFID tag ownership transfer protocol for a closed loop system
    Gaith K.D.Al.
    Ray B.R.
    Chowdhury M.
    International Journal of Networked and Distributed Computing, 2015, 3 (2) : 128 - 136
  • [46] A novel secure group RFID authentication protocol
    GUO Cong
    ZHANG Zi-jian
    ZHU Lie-huang
    TAN Yu-an
    YANG Zhen
    The Journal of China Universities of Posts and Telecommunications, 2014, (01) : 94 - 103
  • [47] Cryptanalysis and improvement of a group RFID authentication protocol
    Pakniat, Nasrollah
    Eslami, Ziba
    WIRELESS NETWORKS, 2020, 26 (05) : 3363 - 3372
  • [48] Cryptanalysis and improvement of a group RFID authentication protocol
    Nasrollah Pakniat
    Ziba Eslami
    Wireless Networks, 2020, 26 : 3363 - 3372
  • [49] A Group-based Ternary Query Splitting Protocol for Tag Identification in RFID Systems
    Jiang, Yi
    Zhang, Ruonan
    Cheng, Wei
    Li, Bin
    Sun, Wei
    PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 267 - 272
  • [50] A novel secure group RFID authentication protocol
    GUO Cong
    ZHANG Zi-jian
    ZHU Lie-huang
    TAN Yu-an
    YANG Zhen
    The Journal of China Universities of Posts and Telecommunications, 2014, 21 (01) : 94 - 103