Secure mobile RFID ownership transfer protocol to cover all transfer scenarios

Ray, Biplob R., Chowdhury, Morshed and Abawajy, Jemal 2012, Secure mobile RFID ownership transfer protocol to cover all transfer scenarios, in ICCCT 2012 : Proceeding of the 7th International Conference on Computing and Convergence Technology, IEEE, Piscataway, N.J., pp. 1185-1192.

Attached Files
Name Description MIMEType Size Downloads

Title Secure mobile RFID ownership transfer protocol to cover all transfer scenarios
Author(s) Ray, Biplob R.
Chowdhury, Morshed
Abawajy, Jemal
Conference name Computing and Convergence Technology. Conference (7th : 2012 : Seoul, Korea)
Conference location Seoul, Korea
Conference dates 3-5 Dec. 2012
Title of proceedings ICCCT 2012 : Proceeding of the 7th International Conference on Computing and Convergence Technology
Editor(s) Kwack, Kae Dal
Kawata, Shigeo
Hwang, Soonwook
Han, Dongsoo
Ko, Franz
Publication date 2012
Conference series Computing and Convergence Technology Conference
Start page 1185
End page 1192
Total pages 8
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) RFID
Tag data conjidentiality
Tag owneship transfer
muti-ownership
transfer scenario
Summary Existing business models require RFID tag to transfer its ownership during its life cycle. As a result, a RFID tags might have many owners during its life cycle. However, the transfer of ownership should ensure that previous owners have no information about current owner's data. Physical ownership does not ensure digital ownership transfer given the wireless nature of communication with RFID tags. Most of the proposed protocol in this nature is implacable to address aU existing RFID tag ownership transfer scenarios. Moreover, they have many security concerns and vulnerabilities. In this paper, we have investigated and discussed all existing business cases and their transfer scenarios. To cover all ownership transfer scenarios, we have presented an ownership transfer protocol. The proposed protocol has used modified DiffieHellman algorithm to perform ownership request validation and authentication of involved parties. Performance comparison shows that our protocol is practical to implement passive low-cost RFID tags, securely performs tag ownership transfer and can be used for all existing ownership transfer scenarios.
ISBN 9788994364223
9788994364261
9788994364216
Language eng
Field of Research 089999 Information and Computing Sciences not elsewhere classified
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2012, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30051363

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 47 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Mon, 18 Mar 2013, 09:42:18 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.