Corpus ID: 284621

An Improved Ownership Transfer for RFID Protocol

  title={An Improved Ownership Transfer for RFID Protocol},
  author={Rui Xie and Bi-yuan Jian and Dao-wei Liu},
  journal={Int. J. Netw. Secur.},
The ownership transfer problems occur during using the RFID tag. In view of the problems of the RFID tag ownership transfer protocol, such as security defects and high computational cost, an improved lightweight RFID tag ownership transfer protocol is proposed in this paper. The improved protocol does not depend on the trusted third party, so that the improved protocol has a wider application space. Using the challenge-response mechanism, the new owner of the tag introduces the counter count… Expand
Provable Secure for the Ultra-lightweight RFID Tag Ownership Transfer Protocol in the Context of IoT Commerce
Performance analysis shows that the proposed protocol can effectively reduce the computational load on the tag side and achieve the goal of reducing the tag’s cost. Expand
New authentication/ownership transfer protocol for RFID objects
A tag traceability attack on a recent authentication protocol, called LSDARP+, proposed to enhance its predecessor, known as the LSDARP protocol, is presented and it is shown that the proposed protocol is secure and lightweight enough for the EPC-C1G2 standard. Expand
RFID Based Verifiable Ownership Transfer Protocol Using Blockchain Technology
  • S. Anandhi, A. Ramalingam, V. Sureshkumar
  • Computer Science
  • 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
  • 2018
This paper aims to provide a verifiable ownership transfer of products attached with an RFID tag using blockchain technology to address various security requirements. Expand
An Improvement RFID Security Authentication Protocol Based on Hash Function
This paper proposes a security authentication protocol that can effectively solve the problems of fraud, retransmission, tracking, and synchronization, and utilizes the reader’s computing and storage functions to reduce the cost of tags, makes the agreement meet the requirements of low-cost, ensures two-way authentication, and improves the efficiency of the security authentication Protocol. Expand
Research and Application of RFID System Security Authentication Protocol Based on ECC Algorithm
This paper studies the lightweight of elliptic curve cryptography (ECC) algorithm, which makes it more suitable for RFID tags, and designs a new RFID two-way authentication protocol combined the advantages and disadvantages of existing protocol based on ECC algorithms. Expand
An Efficient RFID Authentication Protocol Using Dynamic Identity
This work proposes a secure and efficient dynamic mutual authentication protocol for RFID that provides security against replay attacks, impersonation attacks, asynchronous attacks, and tracking attacks while significantly reducing the computational cost on RFID tags and system servers. Expand
Super lightweight mobile RFID authentication protocol for bit replacement operation
A mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation, a bitwise operation to encrypt information and reduce the computational load of communication entities. Expand
Cryptanalysis of the Serverless RFID Authentication and Search Protocols
In this article, we analyze Tan et al.’s serverless RFID authentication and search protocols. Tan et al. proposed a serverless RFID system to solve this problem without a central database whileExpand
A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application
A new secure ECC-based mobile RF ID mutual authentication protocol is proposed for the safety of mobile RFID applications such as security patrolling. Expand
A Lightweight Dual Authentication Protocol for the Internet of Vehicles
This paper proposes a lightweight authentication protocol for the Internet of Vehicles based on a mobile RFID system and gives corresponding security requirements for modeling potential attacks, and shows that the protocol secures is not accessible to attackers during the data transfer. Expand


An Improved Ownership Transfer and Mutual Authentication for Lightweight RFID Protocols
An improved mutual authentication and an improved ownership transfer for low-cost RFID Protocols is suggested and security analysis shows that the protocol owns security and privacy. Expand
Improved Ultra-lightweight Authentication of Ownership Transfer Protocol for RFID Tag
The results show that the proposed protocol not only satisfies the security requirements of transfer of ownership, but also has the characteristics of ultra-lightweight, which indicates that it is suitable for actual mobile authentication environment. Expand
Scalable RFID security protocols supporting tag ownership transfer
A novel scalable RFID authentication protocol based on the scheme presented in Song and Mitchell (2009) [1], that takes constant time to authenticate a tag is proposed. Expand
Single RFID Tag Ownership Transfer Protocols
  • G. Kapoor, S. Piramuthu
  • Computer Science
  • IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)
  • 2012
This work considers ownership transfer scenarios for single tag-single owner with and without a trusted third party (TTP) and proposes protocols that are lightweight and secure from a cryptography perspective. Expand
Secure multiple group ownership transfer protocol for mobile RFID
A secure RFID protocol for group ownership transfer that can transfer group(s) of tags' ownership in one attempt and is able to assign its transfer targets and to secure against most RFID attacks. Expand
Secure RFID Tag Ownership Transfer Based on Quadratic Residues
A novel approach to secure ownership transfer in RFID systems based on the quadratic residue property is proposed-the closed loop and open loop schemes are presented and are resistant to replay, desynchronization, and server impersonation attacks. Expand
RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards
This paper proposes an ideal RFID system, which conforms EPCglobal Class-1 Generation-2 standards ownership transfer, and the features in the method are to ensure the transaction security as well as protect the privacy. Expand
An Efficient Delegation and Transfer of Ownership Protocol for RFID tags
RFID technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the possibility of collecting information about him. As RFID tags may often change hands, itExpand
Low Cost RFID Authentication Protocol with Forward Privacy
Protocol SFP has realized the integration of low tag cost and high security of RFID technology and not only is efficient in both computation and communication but also guarantees both forward privacy and low tags cost. Expand
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
A scheme for RFID pseudonyms that works with legacy, untrusted readers, requires only one message from tag to reader, and is scalable: decoding tag pseudonyms takes work logarithmic in the number of tags. Expand