2012
DOI: 10.1007/978-3-642-25286-0_10
|View full text |Cite
|
Sign up to set email alerts
|

A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation

Abstract: Abstract. RFID systems allow fast and automatic identification of RFID tags through a wireless channel. Information on product items like name, model, purpose, expiration date, etc., can be easily stored and retrieved from RFID tags attached to items. That is why, in the near future, RFID tags can be an active part of our everyday life when interacting with items around us. Frequently, such items may change hands during their lifecycle. Therefore, beyond RFID identification protocols, there is a need for secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…Also, in addition to not being EPC compliant due to the use of hash operations and encryption functions, the protocol does not handle the privacy among the shared owners. More recent protocols such as [50][51][52][53][54][55][56][57] are not suitable for low-cost passive tags because they use hash functions or keyed encryption functions. New shared secret between TTP and Owners in a Owner-Group STs n New shared secret between TTP and Tags in a Tag-Group S1r; S2r…”
Section: Related Workmentioning
confidence: 99%
“…Also, in addition to not being EPC compliant due to the use of hash operations and encryption functions, the protocol does not handle the privacy among the shared owners. More recent protocols such as [50][51][52][53][54][55][56][57] are not suitable for low-cost passive tags because they use hash functions or keyed encryption functions. New shared secret between TTP and Owners in a Owner-Group STs n New shared secret between TTP and Tags in a Tag-Group S1r; S2r…”
Section: Related Workmentioning
confidence: 99%
“…At the opposite of this mechanism, the proposal [16] has the advantage of supporting controlled delegation without needing a counter on the tag's side. Fernndez-Mir et al propose the RFID protocol that not only achieves controlled delegation but also improves the system scalability [17].…”
Section: B) Resistance To Dos Attackmentioning
confidence: 99%
“…A scalable authentication protocol which supports the ownership transfer was proposed in [5]. The protocol provides the controlled delegation without using the non-volatile memory to store a counter.…”
Section: Related Workmentioning
confidence: 99%