An efficient and secure RFID security method with ownership transfer

被引:64
|
作者
Osaka, Kyosuke [1 ]
Takagi, Tsuyoshi [1 ]
Yamazaki, Kenichi [2 ]
Takahashi, Osamu [1 ]
机构
[1] Future Univ Hakodate, 116-2 Kamedanakano, Hakodate, Hokkaido 0418655, Japan
[2] Nippon Telegraph & Tel Corp, Yokosuka, Kanagawa 2398536, Japan
关键词
D O I
10.1109/ICCIAS.2006.295430
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio Frequency Identification (RFID) has come under the spotlight as technology supporting ubiquitous society. But now, we face several security problems and challenges in RFID systems. Recent papers have reported that RFID systems have to achieve the following requirements: (1) Indistinguishability, (2) Forward Security, (3) Replay Attack, (4) Tag Killing, and (5) Ownership Transfer We have to design RFID system that achieves the above-mentioned requirements. The previous methods achieve only some of them individually, and no RFID system has been constructed that achieves all requirements. In this paper we propose an RFID security method that achieves all requirements based on a hash function and a symmetric key cryptosystem. In addition, our proposed method provides not only high-security but also high-efficiency.
引用
收藏
页码:1090 / 1095
页数:6
相关论文
共 50 条
  • [1] An efficient and secure RFID security method with ownership transfer
    Osaka, Kyosuke
    Takagi, Tsuyoshi
    Yamazaki, Kenichi
    Takahashi, Osamu
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 778 - +
  • [2] An Efficient and Secure RFID Protocol with Ownership Transfer
    Tsai, Hsin-Ruey
    Horng, Gwoboa
    Chen, Yu-Chi
    [J]. 2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 592 - 597
  • [3] Enhanced RFID security method with Ownership transfer
    Jappinen, Pekka
    Hamalainen, Harri
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 943 - 946
  • [4] Two Security Problems of RFID Security Method with Ownership Transfer
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. 2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 68 - +
  • [5] Secure Ownership and Ownership Transfer in RFID Systems
    van Deursen, Ton
    Mauw, Sjouke
    Radomirovic, Sasa
    Vullers, Pim
    [J]. COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 637 - 654
  • [6] An Efficient and Secure RFID Batch Authentication Protocol with Group Tags Ownership Transfer
    Zhang, Rong
    Zhu, Liehuang
    Xu, Chang
    Yi, Yi
    [J]. 2015 IEEE CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2015, : 168 - 175
  • [7] A Scalable and Secure RFID Ownership Transfer Protocol
    Mamun, Mohammad Saiful Islam
    Miyaji, Atsuko
    [J]. 2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 343 - 350
  • [8] A Secure and Efficient Two-Party Protocol Enabling Ownership Transfer of RFID Objects
    Bi, Ye
    Fan, Kai
    Zhang, Kuan
    Bai, Yuhan
    Li, Hui
    Yang, Yintang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (18) : 16225 - 16237
  • [9] An Efficient and Secure Method for Simultaneous Ownership Transfer of Multiple Mobile Readers
    Yang, Ming-Hour
    Chen, Chien-Hung
    Luo, Jia-Ning
    Vijayalakshmi, M.
    Shalinie, S. Mercy
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (03): : 3611 - 3622
  • [10] Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud On Security of AN RFID Ownership Transfer Protocol Based on Cloud
    Lee, Cheng-Chi
    Chen, Shun-Der
    Li, Chun-Ta
    Cheng, Chung-Lun
    Lai, Yan-Ming
    [J]. 2018 5TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2018) / 2018 4TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2018), 2018, : 134 - 139