skip to main content
10.1145/1244002.1244069acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism

Published: 11 March 2007 Publication History

Abstract

Out of three types of RFID (Radio Frequency IDentification) tags, passive tags are widely used as they are cheaper and long-lasting. However, those tags are bounded with constraints, and also there is no acceptable method to manage the changing hands of the same tagged-product throughout the product lifecycle. Therefore, ensuring security and privacy of RFID tagged-products during the product-lifecycle has become crucial. This paper proposes a method named POP (Product-flow with Ownership-transferring Protocol), which consists of robust communication protocol and anonymous-ownership transferring mechanism to securely manage the changing hands of the same tagged-products and to control the behaviors of tags throughout the product lifecycle. Furthermore, the proposed method alleviates the risks by providing the controlling power of communication to the tagged-products' owners and also by introducing a long-term security maintenance technique. Thus, the POP method comprehensively ensures the privacy and security in RFID tagged-products used throughout the product lifecycle.

References

[1]
David M, Andrea S, and David W, A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags ECRYPT Workshop on RFID and Lightweight Crypto, Graz University of Technology, Graz, Austria (2005).
[2]
Gary M. Pisarsky, RFID Technology: An Analysis of Privacy and Security Issues, 20th Computer Science Seminar, SA3-T1, (2004)
[3]
Gao X, Xiang Z, Wang H, Shen J, Huang J, Song S, An Approach to Security And Privacy of RFID System For Supply Chain. Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC-East'04)
[4]
Gwo-Ching Chang, A Feasible Security Mechanism for Low Cost RFID Tags. Proceedings of the ICMB'05. 2005 IEEE
[5]
Lei Y and Henry C. B. Chan, RFID-based Logistics Control System for Business-to-Business E-commerce, Proceedings of the ICMB'05, (2005).
[6]
Martin H, Thomas J and Willi M. Grain -A Stream Cipher for Constrained Environments, ECRYPT Workshop on RFID and Lightweight Crypto, (2005) pages 114--125
[7]
Simson Garfinkel, Ari Juels, Ravi Pappu, RFID Privacy: An Overview of Problems and Proposed Solutions Published By The IEEE Computer Society, IEEE Security & Privacy. 2005.
[8]
Stephan J. Engberg, Morten B. Harning, Christian Damsgaard Jensen, Zero-knowledge Device Authentication: Privacy and Security Enhanced RFID preserving Business Value and Consumer Convenience, (2004).
[9]
Weis S. A, Sarma S. E, Rivest R. L and Daniel W. E., Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. Laboratory for Computer Science-Auto-ID Center. MIT, USA

Cited By

View all
  • (2018)Anti-counterfeit ownership transfer protocol for low cost RFID systemWSEAS Transactions on Computers10.5555/1457999.14580037:8(1149-1158)Online publication date: 17-Dec-2018
  • (2017)An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity ChannelsSensors10.3390/s1707156217:7(1562)Online publication date: 4-Jul-2017
  • (2014)A Novel RFID Sensing System Using Enhanced Surface Wave Technology for Battery Exchange StationsMathematical Problems in Engineering10.1155/2014/8694892014(1-11)Online publication date: 2014
  • Show More Cited By

Index Terms

  1. POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SAC '07: Proceedings of the 2007 ACM symposium on Applied computing
    March 2007
    1688 pages
    ISBN:1595934804
    DOI:10.1145/1244002
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 March 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. RFID tag
    2. anonymous ownership transfer
    3. grain 1 stream-cipher
    4. privacy
    5. product lifecycle
    6. protocol

    Qualifiers

    • Article

    Conference

    SAC07
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

    Upcoming Conference

    SAC '25
    The 40th ACM/SIGAPP Symposium on Applied Computing
    March 31 - April 4, 2025
    Catania , Italy

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)Anti-counterfeit ownership transfer protocol for low cost RFID systemWSEAS Transactions on Computers10.5555/1457999.14580037:8(1149-1158)Online publication date: 17-Dec-2018
    • (2017)An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity ChannelsSensors10.3390/s1707156217:7(1562)Online publication date: 4-Jul-2017
    • (2014)A Novel RFID Sensing System Using Enhanced Surface Wave Technology for Battery Exchange StationsMathematical Problems in Engineering10.1155/2014/8694892014(1-11)Online publication date: 2014
    • (2014)A Gen2v2 compliant RFID authentication and ownership management protocol39th Annual IEEE Conference on Local Computer Networks10.1109/LCN.2014.6925788(331-336)Online publication date: Sep-2014
    • (2013)Secure and Efficient Control Transfer for IoT DevicesInternational Journal of Distributed Sensor Networks10.1155/2013/5034049:11(503404)Online publication date: Jan-2013
    • (2011)Across-authority lightweight ownership transfer protocolElectronic Commerce Research and Applications10.1016/j.elerap.2011.03.00110:4(375-383)Online publication date: 1-Jul-2011
    • (2011)How to protect security and privacy in the IoT: a policy‐based RFID tag management protocolSecurity and Communication Networks10.1002/sec.4007:12(2669-2683)Online publication date: 9-Dec-2011
    • (2011)Protocol for ownership transfer across authorities: with the ability to assign transfer targetSecurity and Communication Networks10.1002/sec.3005:2(164-177)Online publication date: 25-Feb-2011
    • (2010)An agent based back-end RFID tag management systemProceedings of the 7th international conference on Trust, privacy and security in digital business10.5555/1894888.1894908(165-176)Online publication date: 30-Aug-2010
    • (2010)Lightweight mutual authentication and ownership transfer for RFID systemsProceedings of the 29th conference on Information communications10.5555/1833515.1833566(251-255)Online publication date: 14-Mar-2010
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media