RFID ownership transfer protocol based on cloud

Cao, Tianjie, Chen, Xiuqing, Doss, Robin, Zhai, Jingxuan, Wise, Lucas J. and Zhao, Qiang 2016, RFID ownership transfer protocol based on cloud, Computer networks, vol. 105, pp. 47-59, doi: 10.1016/j.comnet.2016.05.017.

Attached Files
Name Description MIMEType Size Downloads

Title RFID ownership transfer protocol based on cloud
Author(s) Cao, Tianjie
Chen, Xiuqing
Doss, RobinORCID iD for Doss, Robin orcid.org/0000-0001-6143-6850
Zhai, Jingxuan
Wise, Lucas J.
Zhao, Qiang
Journal name Computer networks
Volume number 105
Start page 47
End page 59
Total pages 13
Publisher Elsevier BV
Place of publication Amsterdam, The Netherlands
Publication date 2016-08-04
ISSN 1389-1286
Keyword(s) RFID
internet of things
backward untraceability
strong forward untraceability
Summary RFID and Cloud computing are widely used in the IoT (Internet of Things). However, there are few research works which combine RFID ownership transfer schemes with Cloud computing. Subsequently, this paper points out the weaknesses in two protocols proposed by Xie et al. (2013) [3] and Doss et al. (2013) [9]. To solve the security issues of these protocols, we present a provably secure RFID ownership transfer protocol which achieves the security and privacy requirements for cloud-based applications. To be more specific, the communication channels among the tags, mobile readers and the cloud database are insecure. Besides, an encrypted hash table is used in the cloud database. Next, the presented protocol not only meets backward untraceability and the proposed strong forward untraceability, but also resists against replay attacks, tracing attacks, inner reader malicious impersonation attacks, tag impersonation attacks and desynchronization attacks. The comparisons of security and performance properties show that the proposed protocol has more security, higher efficiency and better scalability compared with other schemes.
Language eng
DOI 10.1016/j.comnet.2016.05.017
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2016, Elsevier B.V.
Persistent URL http://hdl.handle.net/10536/DRO/DU:30085506

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 3 times in TR Web of Science
Scopus Citation Count Cited 3 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 152 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Fri, 19 Aug 2016, 05:00:27 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.