Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy

Sundaresan, Saravanan, Doss, Robin, Zhou, Wanlei and Piramuthu, Selwyn 2015, Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy, Computer communications, vol. 55, pp. 112-124, doi: 10.1016/j.comcom.2014.08.015.

Attached Files
Name Description MIMEType Size Downloads

Title Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy
Author(s) Sundaresan, Saravanan
Doss, RobinORCID iD for Doss, Robin orcid.org/0000-0001-6143-6850
Zhou, WanleiORCID iD for Zhou, Wanlei orcid.org/0000-0002-1680-2521
Piramuthu, Selwyn
Journal name Computer communications
Volume number 55
Start page 112
End page 124
Total pages 13
Publisher Elsevier
Place of publication Amsterdam, The Netherlands
Publication date 2015-01-01
ISSN 0140-3664
Keyword(s) Science & Technology
Technology
Computer Science, Information Systems
Engineering, Electrical & Electronic
Telecommunications
Computer Science
Engineering
RFID systems
Ownership transfer
Multi-owner
Multi-tag
Security protocols
TRANSFER SCHEME
SUPPLY CHAINS
PROTOCOLS
SYSTEMS
GENERATOR
DEVICES
Summary In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner RFID environment that provides individual-owner-privacy. To our knowledge, the existing schemes do not provide individual-owner-privacy and most of the existing schemes do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since the protocols use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill these gaps by proposing a protocol that provides individual-owner-privacy, based on simple XOR and 128-bit pseudo-random number generators (PRNG), operations that are easily implemented on low-cost RFID tags while meeting the necessary security requirements thus making it a viable option for large scale implementations. Our protocol also provides additional protection by hiding the pseudo-random numbers during all transmissions using a blind-factor to prevent tracking attacks.
Language eng
DOI 10.1016/j.comcom.2014.08.015
Field of Research 080303 Computer System Security
0805 Distributed Computing
1005 Communications Technologies
0906 Electrical And Electronic Engineering
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2015, Elsevier
Persistent URL http://hdl.handle.net/10536/DRO/DU:30076954

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 9 times in TR Web of Science
Scopus Citation Count Cited 18 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 283 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Tue, 08 Mar 2016, 16:42:49 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.