Title :
Vulnerabilities in some recently proposed RFID ownership transfer protocols
Author :
Kapoor, Gaurav ; Piramuthu, Selwyn
Author_Institution :
Inf. Syst. & Oper. Manage. Dept., Univ. of Florida, Gainesville, FL, USA
fDate :
3/1/2010 12:00:00 AM
Abstract :
Authentication of RFID tags is commonly achieved through cryptographic means with protocols that encrypt communication between the parties of interest. There is an extensive literature in this area that address various facets associated with authentication. As RFID tags gain more popularity, there is a concomitant increase in frequency with which they (i.e., the tagged object) change ownership. There is, therefore, an urgent need to develop and evaluate protocols that address issues related to ownership transfer of RFID tags. Over the past few years, researchers have proposed several ownership transfer protocols. We consider some of the ownership transfer protocols that were published during the past year and identify present vulnerabilities.
Keywords :
radiofrequency identification; telecommunication security; transport protocols; RFID ownership transfer protocols; RFID tags; authentication; radiofrequency identification; vulnerability; Access protocols; Authentication; Cryptographic protocols; Cryptography; Databases; Frequency; Privacy; RFID tags; Radiofrequency identification; Security; RFID; authentication; ownership transfer; vulnerability;
Journal_Title :
Communications Letters, IEEE
DOI :
10.1109/LCOMM.2010.03.092058