skip to main content
10.1145/1516241.1516284acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Enhancement of the RFID security method with ownership transfer

Published: 15 February 2009 Publication History

Abstract

Radio frequency identification (RFID) is one popular technology being deployed for a variety of applications. Privacy and security issues play major roles in the success of RFID applications due to ease with masquerade, eavesdropping, etc. over the insecure channel between the tag and the reader. These security requirements are summarized: indistinguishability, forward security, ownership transfer, and resistance to replay attack and tag killing. Much research has been proposed. Except Osaka et al.'s scheme, none can meet all requirements. However, this paper introduces a new type of DoS attack which is ignored in these research studies to endanger their securities. As Osaka et al.'s scheme is superior to the others in terms of the functionalities, we take it as an example to show the possibility of the new DoS attack. A remedy is further provided to enhance the security to make the scheme more practical.

References

[1]
G. Avoine, E. Dysli, and P. Oechslin. Reducing time complexity in RFID systems. In Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography, Canada Kingston, Canada, LNCS 3897, pp. 291--306, 2005.
[2]
D. G. Han, T. Takagi, H. W. Kim, and K. I. Chung. New security problem in RFID systems tag killing. In Proceedings of International Conference on Applied Cryptography and Information Security, Glasgow, UK, LNCS 3982, pp. 375--384, 2006.
[3]
S. Kinoshita, F. Hoshino, T. Komuro, A. Fujimura, and M. Ohkubo. Low-cost RFID privacy protection scheme. Transactions of Information Processing Society of Japan, vol. 45, no. 8, pp. 2007--2021, 2004.
[4]
K. C. Liu, H. W. Wang, and H. F. Huang. Enhancement of the mutual authentication protocol on RFID passive tag. In Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, vol. 1, pp. 261--264, Nov. 2007.
[5]
M. Ohkubo, K. Suzuki, and S. Kinoshita. Cryptographic approach to "privacy-friendly" tags. In Proceedings of RFID Privacy Workshop, MIT, 2003.
[6]
K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi. An efficient and secure RFID security method with ownership transfer. In Proceedings of International Conference on Computational Intelligence and Security, Guangzhou, China, vol. 2, pp. 1090--1095, Nov. 2006.
[7]
S. Piramuthu. Protocols for RFID tag/reader authentication. Decision Support Systems, vol. 43, no. 3, pp. 897--914, Apr. 2007.
[8]
K. Rhee, J. Kwak, S. Kim, and D. Won. Challenge-response based RFID authentication protocol for distributed database environment. In Proceedings of the 2nd International Conference on Security in Pervasive Computing, Boppard, Germany, LNCS 3450, pp. 70--84, 2005.
[9]
J. Saito and K. Sakurai. Owner transferable privacy protection scheme for RFID tags. Joho Shori Gakkai Shinpojiumu Ronbunshu, vol. 2005, no. 13, pp. 283--288, 2005.
[10]
B. Schneier. Applied Cryptography. 2nd Edition. John Wiley and Sons, New York, 1996.
[11]
S. A. Weis, S. Sarma, R. Rivest, and D. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In Proceedings of the 1st International Conference on Security in Pervasive Computing, Boppard, Germany, LNCS 2802, pp. 201--212, 2003.
[12]
K. Yuksel. Universal hashing for ultra-low-power cryptographic hardware applications. Master's Thesis, Dept. of Electronical Engineering, WPI 2004.

Cited By

View all
  • (2023)An Efficient and Secure Method for Simultaneous Ownership Transfer of Multiple Mobile ReadersIEEE Systems Journal10.1109/JSYST.2023.325197017:3(3611-3622)Online publication date: Sep-2023
  • (2019)A Secure Partial RFID Ownership Transfer Protocol with Multi-OwnersSensors10.3390/s2001002220:1(22)Online publication date: 19-Dec-2019
  • (2019)A lightweight inter-zonal authentication protocol for moving objects in low powered RF systemsJournal of Intelligent & Fuzzy Systems10.3233/JIFS-16994536:3(2345-2354)Online publication date: 26-Mar-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
February 2009
704 pages
ISBN:9781605584058
DOI:10.1145/1516241
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 February 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. RFID system
  2. efficiency
  3. integrity
  4. ownership transfer

Qualifiers

  • Research-article

Conference

ICUIMC '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 251 of 941 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)An Efficient and Secure Method for Simultaneous Ownership Transfer of Multiple Mobile ReadersIEEE Systems Journal10.1109/JSYST.2023.325197017:3(3611-3622)Online publication date: Sep-2023
  • (2019)A Secure Partial RFID Ownership Transfer Protocol with Multi-OwnersSensors10.3390/s2001002220:1(22)Online publication date: 19-Dec-2019
  • (2019)A lightweight inter-zonal authentication protocol for moving objects in low powered RF systemsJournal of Intelligent & Fuzzy Systems10.3233/JIFS-16994536:3(2345-2354)Online publication date: 26-Mar-2019
  • (2018)Tag Ownership Transfer in Radio Frequency Identification Systems: A Survey of Existing Protocols and Open ChallengesIEEE Access10.1109/ACCESS.2018.28427786(32117-32155)Online publication date: 2018
  • (2017)An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity ChannelsSensors10.3390/s1707156217:7(1562)Online publication date: 4-Jul-2017
  • (2016)RFID Ownership Transfer with Positive Secrecy Capacity ChannelsSensors10.3390/s1701005317:12(53)Online publication date: 29-Dec-2016
  • (2016)EPC Gen2v2 RFID Standard Authentication and Ownership Management ProtocolIEEE Transactions on Mobile Computing10.1109/TMC.2015.241293315:1(137-149)Online publication date: 1-Jan-2016
  • (2015)Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacyComputer Communications10.1016/j.comcom.2014.08.01555:C(112-124)Online publication date: 1-Jan-2015
  • (2014)An Efficient Offline Delegation Protocol in Mobile RFID EnvironmentJournal of Networks10.4304/jnw.9.5.1114-11209:5Online publication date: 8-May-2014
  • (2014)New Gen2v2-Based Mutual Authentication SchemesProceedings of the 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion10.1109/SERE-C.2014.26(88-96)Online publication date: 30-Jun-2014
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media