Towards secure authenticating of cache in the reader for RFID-based IoT systems
The use of radio frequency identification (RFID) in Internet of things (IoT) has led to a
significant progress in numerous intelligent devices. However, due to its restrictions on …
significant progress in numerous intelligent devices. However, due to its restrictions on …
Attacks on RFID protocols
T Van Deursen, S Radomirović - Cryptology ePrint Archive, 2009 - discovery.dundee.ac.uk
This document consists of a collection of attacks upon RFID protocols and is meant to serve
as a quick and easy reference. This document will be updated as new attacks are found …
as a quick and easy reference. This document will be updated as new attacks are found …
Secure RFID tag ownership transfer based on quadratic residues
In this paper, we propose a novel approach to secure ownership transfer in RFID systems
based on the quadratic residue property. We present two secure ownership transfer …
based on the quadratic residue property. We present two secure ownership transfer …
Universal and secure object ownership transfer protocol for the Internet of Things
In this paper, we address the problem of ownership transfer of RFID tagged objects in
Internet of Things (IoT) in a secure manner. In application domains such as supply chain …
Internet of Things (IoT) in a secure manner. In application domains such as supply chain …
Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy
In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner
RFID environment that provides individual-owner-privacy. To our knowledge, the existing …
RFID environment that provides individual-owner-privacy. To our knowledge, the existing …
Secure tag search in RFID systems using mobile readers
S Sundaresan, R Doss, S Piramuthu… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
One of the important features of an RFID system is its ability to search for a particular tag
among a group of tags. In order to ensure privacy and security of the tags, the search has to …
among a group of tags. In order to ensure privacy and security of the tags, the search has to …
An RFID-based smart structure for the supply chain: Resilient scanning proofs and ownership transfer with positive secrecy capacity channels
The National Strategy for Global Supply Chain Security published in 2012 by the White
House identifies two primary goals for strengthening global supply chains: first, to promote …
House identifies two primary goals for strengthening global supply chains: first, to promote …
Secure multiple group ownership transfer protocol for mobile RFID
MH Yang - Electronic Commerce Research and Applications, 2012 - Elsevier
With the combination of mobile devices and readers in recent years, mobile Radio
Frequency Identification (RFID) systems have been widely deployed in mobile identification …
Frequency Identification (RFID) systems have been widely deployed in mobile identification …
A secure partial RFID ownership transfer protocol with multi-owners
JN Luo, MH Yang - Sensors, 2019 - mdpi.com
Mobile radio frequency identification (RFID) has been extensively applied in a wide range of
fields. In supply chain management, RFID is used to more efficiently manage the ownership …
fields. In supply chain management, RFID is used to more efficiently manage the ownership …
Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments
Sundaresan et al. proposed recently a novel ownership transfer protocol for multi-tag multi-
owner RFID environments that complies with the EPC Class1 Generation2 standard. The …
owner RFID environments that complies with the EPC Class1 Generation2 standard. The …