Skip to main content

A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((volume 7055))

Abstract

RFID systems allow fast and automatic identification of RFID tags through a wireless channel. Information on product items like name, model, purpose, expiration date, etc., can be easily stored and retrieved from RFID tags attached to items. That is why, in the near future, RFID tags can be an active part of our everyday life when interacting with items around us. Frequently, such items may change hands during their life-cycle. Therefore, beyond RFID identification protocols, there is a need for secure and private ownership transfer protocols in RFID systems. To ensure privacy to tag owners, the keys of tags are usually updated during the ownership transfer process. However, none of the previous proposals takes advantage of this property to improve the system scalability. To the best of our knowledge, we propose the first RFID identification protocol supporting ownership transfer that is secure, private and scalable. Furthermore, our proposal achieves other valuable properties related to ownership transfer, such as controlled delegation and decentralization.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alomair, B., Poovendran, R.: Privacy versus scalability in radio frequency identification systems. Computer Communications 33(18), 2155–2163 (2010)

    Article  Google Scholar 

  2. Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 291–306. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Chen, H.B., Lee, W.B., Zhao, Y.H., Chen, Y.L.: Enhancement of the RFID security method with ownership transfer. In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, pp. 251–254. ACM (2009)

    Google Scholar 

  4. Dimitriou, T.: rfidDOT: RFID delegation and ownership transfer made simple. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, pp. 1–8. ACM (2008)

    Google Scholar 

  5. Fernàndez-Mir, A., Castellà-Roca, J., Viejo, A.: Secure and Scalable RFID Authentication Protocol. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol. 6514, pp. 231–243. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  6. Fouladgar, S., Afifi, H.: An efficient delegation and transfer of ownership protocol for RFID tags. In: First International EURASIP Workshop on RFID Technology, Vienna, Austria (2007)

    Google Scholar 

  7. Goebel, C., Tribowski, C., Gunther, O., Troeger, R., Nickerl, R.: RFID in the Supply Chain: How to Obtain a Positive ROI-The Case of Gerry Weber. In: 11th International Conference on Enterprise Information Systems (ICEIS 2009), Milan, Italy, vol. 10, pp. 95–102 (May 6, 2009)

    Google Scholar 

  8. Kapoor, G., Piramuthu, S.: Vulnerabilities in some recently proposed RFID ownership transfer protocols. In: 2009 First International Conference on Networks & Communications, pp. 354–357. IEEE (2009)

    Google Scholar 

  9. Langheinrich, M.: A survey of RFID privacy approaches. Personal and Ubiquitous Computing 13(6), 413–421 (2009)

    Article  Google Scholar 

  10. Molnar, D., Soppera, A., Wagner, D.: A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 276–290. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An Efficient and Secure RFID Security Method with Ownership Transfer. In: 2006 International Conference on Computational Intelligence and Security, vol. 2, pp. 1090–1095. IEEE (2007)

    Google Scholar 

  12. Saito, J., Imamoto, K., Sakurai, K.: Reassignment Scheme of an RFID Tag’s Key for Owner Transfer. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS 2005. LNCS, vol. 3823, pp. 1303–1312. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Sarma, S.E.: Towards the five-cent tag. Technical report (2001)

    Google Scholar 

  14. Song, B., Mitchell, C.J.: Scalable RFID security protocols supporting tag ownership transfer. In: Computer Communications (2010)

    Google Scholar 

  15. European Union. Commission recommendation of 12 may 2009 on the implementation of privacy and data protection principles in applications supported by radiofrequency identification. Technical Report Official Journal of the European Union (May 2009)

    Google Scholar 

  16. Yoon, E.J., Yoo, K.Y.: Two security problems of RFID security method with ownership transfer. In: IFIP International Conference on Network and Parallel Computing, NPC 2008, pp. 68–73. IEEE (2008)

    Google Scholar 

  17. Yu Ng, C., Susilo, W., Mu, Y., Safavi-Naini, R.: Practical RFID Ownership Transfer Scheme. Journal of Computer Security - Special Issue on RFID System Security (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fernàndez-Mir, A., Trujillo-Rasua, R., Castellà-Roca, J., Domingo-Ferrer, J. (2012). A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation. In: Juels, A., Paar, C. (eds) RFID. Security and Privacy. RFIDSec 2011. Lecture Notes in Computer Science, vol 7055. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25286-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25286-0_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25285-3

  • Online ISBN: 978-3-642-25286-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics