Browse > Article
http://dx.doi.org/10.7840/kics.2015.40.3.568

RFID Tag Ownership Relocation Protocol Based on Trusted Third Party  

Kim, Young-Sik (Chosun University, Department of Information and Communication Engineering)
Abstract
Recently RFID not only is widely utilized in various fields such as inventory management, merchandize logistics, etc., but also, has evolved as an important component of the Internet of Things (IoT). According to increasing the utilization field of RIFD, studies for security and privacy for RFID system have been made diverse. Among them, the ownership transfer protocols for RFID tags have also been proposed in connection with the purchase of products embedded with RFID tag. Recently, Kapoor and Piramuthu proposed a RFID ownership transfer protocol to solve the problems of security weakness of the previous RFID ownership transfer protocols. In this paper, we show that Kapoor-Piramuthu's protocol also has security problems and provide a new protocol to resolve them. Security analysis of newly proposed protocol shows the security concerns are resolved.
Keywords
ownership transfer protocol (OTP); trusted third party; authentication; RFID; lightweight cryptography;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 S. Dominikus and J.-M. Schmidt, "Connecting passive RFID tags to the internet of things," in Proc. Interconnecting Smart Objects with the Internet Workshop, Prague, 2011.
2 W. S. Choi, S. S. Kim, Y. H. Kim, T. J. Yoon, K. W. Ahn, and K. J. Han, "Design of PUF-based encryption processor and mutual authentication protocol for low-cost RFID authentication," J. KICS, vol. 39, no. 12, pp. 831-841, Dec. 2014.
3 J. S. Kim, J. K. Park, and Y. T. Shin, "RFID-based automatic inspection system design and implementation for manufacturing and retail industry," J. KICS, vol. 39, no. 1, pp. 97-105, Jan. 2014.
4 S. J. Oh, C. H. Lee, T. J. Yoon, K. H. Chung, and K. S. Ahn, "Improved authentication protocol for privacy protection in RFID systems," J. KICS, vol. 38, no. 1, pp. 12-18, Jan. 2013.
5 D. Molnar, A. Soppera, and D. Wagner, "A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags," in Workshop on RFID Security and Light-Weight Crypto., Jul. 2005.
6 J. Saito, K. Imamoto, and K. Sakurai, "Reassignment scheme of an RFID tag's key for owner transfer," in Proc. EUC Workshops, vol. 3823 LNCS, pp. 1303-1312, 2005.
7 G. Kapoor and S. Piramuthu, "Single RFID tag ownership transfer protocols," IEEE Trans. Systems, Man, and Cybernetics, Part C, vol. 42, no. 2, pp. 164-173, 2012.   DOI
8 G. Kapoor, W. Zhou, and S. Piramuthu, "Multi-tag and multi-owner RFID ownership transfer in supply chains," Decision Support Syst., vol. 52, no. 1, pp. 258-270, 2011.   DOI   ScienceOn
9 H. Lei and T. Cao, "RFID protocol enabling ownership transfer to protect against traceability and dos attacks," in Proc. 1st Int. Symp. Data, Privcacy E-Commerce, pp. 508-510, 2007.
10 G. Kapoor and S. Piramuthu, "Single RFID tag ownership transfer protocols," IEEE Trans. Syst., Man, and Cybernetics, Part C, vol. 42, no. 2, pp. 164-173, 2012.   DOI
11 G. Kapoor, W. Zhou, and S. Piramuthu, "Multi-tag and multi-owner RFID ownership transfer in supply chains," Decision Support Syst., vol. 52, no. 1, pp. 258-270, 2011.   DOI   ScienceOn
12 G. Kapoor and S. Piramuthu, "Vulnerabilities ini some recently proposed RFID ownership transfer protocols," in Proc. NetCoM'09, pp. 354-357, 2009.