{"title":"低成本RFID标签的安全所有权转移方案","authors":"Tongliang Li, Zhigang Jin, C. Pang","doi":"10.1109/ICINIS.2010.13","DOIUrl":null,"url":null,"abstract":"Although widely used in various applications, the current RFID (Radio Frequency Identification) systems lack efficiently enforcement of security and privacy. Furthermore, considering that the bearer of a RFID tag might be changed, the ownership transferring of the tags also becomes an issue. Some schemes have been suggested, but they are lack of participation of people. In this paper, we propose a novel scheme for the low-cost passive RFID tags. In our approach, people are involved in the authentication process. After getting some information from the assistant tag and user's password, the reader uses them to update the key of the common tags to be identified, and this makes the secured ownership transfer come true. In order to reach our goal, pseudonym, mutual authentication mechanism, and lightweight functions are employed. The analysis shows that our scheme not only achieves the secure and private goals, but also supports secured controlled ownership transfer.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Secured Ownership Transfer Scheme for Low-Cost RFID Tags\",\"authors\":\"Tongliang Li, Zhigang Jin, C. Pang\",\"doi\":\"10.1109/ICINIS.2010.13\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Although widely used in various applications, the current RFID (Radio Frequency Identification) systems lack efficiently enforcement of security and privacy. Furthermore, considering that the bearer of a RFID tag might be changed, the ownership transferring of the tags also becomes an issue. Some schemes have been suggested, but they are lack of participation of people. In this paper, we propose a novel scheme for the low-cost passive RFID tags. In our approach, people are involved in the authentication process. After getting some information from the assistant tag and user's password, the reader uses them to update the key of the common tags to be identified, and this makes the secured ownership transfer come true. In order to reach our goal, pseudonym, mutual authentication mechanism, and lightweight functions are employed. The analysis shows that our scheme not only achieves the secure and private goals, but also supports secured controlled ownership transfer.\",\"PeriodicalId\":319379,\"journal\":{\"name\":\"2010 Third International Conference on Intelligent Networks and Intelligent Systems\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Third International Conference on Intelligent Networks and Intelligent Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICINIS.2010.13\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICINIS.2010.13","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secured Ownership Transfer Scheme for Low-Cost RFID Tags
Although widely used in various applications, the current RFID (Radio Frequency Identification) systems lack efficiently enforcement of security and privacy. Furthermore, considering that the bearer of a RFID tag might be changed, the ownership transferring of the tags also becomes an issue. Some schemes have been suggested, but they are lack of participation of people. In this paper, we propose a novel scheme for the low-cost passive RFID tags. In our approach, people are involved in the authentication process. After getting some information from the assistant tag and user's password, the reader uses them to update the key of the common tags to be identified, and this makes the secured ownership transfer come true. In order to reach our goal, pseudonym, mutual authentication mechanism, and lightweight functions are employed. The analysis shows that our scheme not only achieves the secure and private goals, but also supports secured controlled ownership transfer.