RFID Tag Ownership Relocation Protocol Based on Trusted Third Party 


Vol. 40,  No. 3, pp. 568-574, Mar.  2015


PDF
  Abstract

Recently RFID not only is widely utilized in various fields such as inventory management, merchandize logistics, etc., but also, has evolved as an important component of the Internet of Things (IoT). According to increasing the utilization field of RIFD, studies for security and privacy for RFID system have been made diverse. Among them, the ownership transfer protocols for RFID tags have also been proposed in connection with the purchase of products embedded with RFID tag. Recently, Kapoor and Piramuthu proposed a RFID ownership transfer protocol to solve the problems of security weakness of the previous RFID ownership transfer protocols. In this paper, we show that Kapoor-Piramuthu"s protocol also has security problems and provide a new protocol to resolve them. Security analysis of newly proposed protocol shows the security concerns are resolved.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. Kim, "RFID Tag Ownership Relocation Protocol Based on Trusted Third Party," The Journal of Korean Institute of Communications and Information Sciences, vol. 40, no. 3, pp. 568-574, 2015. DOI: .

[ACM Style]

Young-Sik Kim. 2015. RFID Tag Ownership Relocation Protocol Based on Trusted Third Party. The Journal of Korean Institute of Communications and Information Sciences, 40, 3, (2015), 568-574. DOI: .

[KICS Style]

Young-Sik Kim, "RFID Tag Ownership Relocation Protocol Based on Trusted Third Party," The Journal of Korean Institute of Communications and Information Sciences, vol. 40, no. 3, pp. 568-574, 3. 2015.