Title :
Secure mobile RFID ownership transfer protocol to cover all transfer scenarios
Author :
Ray, Biplob Rakshit ; Chowdhury, Mashrur ; Abawajy, Jemal
Author_Institution :
Sch. of Inf. Technol., Deakin Univ., Melbourne, VIC, Australia
Abstract :
Existing business models require RFID tag to transfer its ownership during its life cycle. As a result, a RFID tags might have many owners during its life cycle. However, the transfer of ownership should ensure that previous owners have no information about current owner´s data. Physical ownership does not ensure digital ownership transfer given the wireless nature of communication with RFID tags. Most of the proposed protocol in this nature is implacable to address all existing RFID tag ownership transfer scenarios. Moreover, they have many security concerns and vulnerabilities. In this paper, we have investigated and discussed all existing business cases and their transfer scenarios. To cover all ownership transfer scenarios, we have presented an ownership transfer protocol. The proposed protocol has used modified Diffie-Hellman algorithm to perform ownership request validation and authentication of involved parties. Performance comparison shows that our protocol is practical to implement passive low-cost RFID tags, securely performs tag ownership transfer and can be used for all existing ownership transfer scenarios.
Keywords :
cryptographic protocols; radiofrequency identification; telecommunication security; transport protocols; RFID tag ownership transfer scenarios; business models; digital ownership transfer; modified Diffie-Hellman algorithm; passive low-cost RFID tags; secure mobile RFID ownership transfer protocol; transfer scenarios; RFID; Tag data confidentiality; Tag owneship transfer; muti-ownership; transfer scenario;
Conference_Titel :
Computing and Convergence Technology (ICCCT), 2012 7th International Conference on
Conference_Location :
Seoul
Print_ISBN :
978-1-4673-0894-6