Towards secure authenticating of cache in the reader for RFID-based IoT systems

CT Li, CC Lee, CY Weng, CM Chen - Peer-to-Peer Networking and …, 2018 - Springer
The use of radio frequency identification (RFID) in Internet of things (IoT) has led to a
significant progress in numerous intelligent devices. However, due to its restrictions on …

Attacks on RFID protocols

T Van Deursen, S Radomirović - Cryptology ePrint Archive, 2009 - discovery.dundee.ac.uk
This document consists of a collection of attacks upon RFID protocols and is meant to serve
as a quick and easy reference. This document will be updated as new attacks are found …

Secure RFID tag ownership transfer based on quadratic residues

R Doss, W Zhou, S Yu - IEEE Transactions on Information …, 2012 - ieeexplore.ieee.org
In this paper, we propose a novel approach to secure ownership transfer in RFID systems
based on the quadratic residue property. We present two secure ownership transfer …

Universal and secure object ownership transfer protocol for the Internet of Things

BR Ray, J Abawajy, M Chowdhury, A Alelaiwi - Future Generation …, 2018 - Elsevier
In this paper, we address the problem of ownership transfer of RFID tagged objects in
Internet of Things (IoT) in a secure manner. In application domains such as supply chain …

Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy

S Sundaresan, R Doss, W Zhou, S Piramuthu - Computer Communications, 2015 - Elsevier
In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner
RFID environment that provides individual-owner-privacy. To our knowledge, the existing …

Secure tag search in RFID systems using mobile readers

S Sundaresan, R Doss, S Piramuthu… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
One of the important features of an RFID system is its ability to search for a particular tag
among a group of tags. In order to ensure privacy and security of the tags, the search has to …

An RFID-based smart structure for the supply chain: Resilient scanning proofs and ownership transfer with positive secrecy capacity channels

M Burmester, J Munilla, A Ortiz, P Caballero-Gil - Sensors, 2017 - mdpi.com
The National Strategy for Global Supply Chain Security published in 2012 by the White
House identifies two primary goals for strengthening global supply chains: first, to promote …

Secure multiple group ownership transfer protocol for mobile RFID

MH Yang - Electronic Commerce Research and Applications, 2012 - Elsevier
With the combination of mobile devices and readers in recent years, mobile Radio
Frequency Identification (RFID) systems have been widely deployed in mobile identification …

A secure partial RFID ownership transfer protocol with multi-owners

JN Luo, MH Yang - Sensors, 2019 - mdpi.com
Mobile radio frequency identification (RFID) has been extensively applied in a wide range of
fields. In supply chain management, RFID is used to more efficiently manage the ownership …

Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments

J Munilla, M Burmester, A Peinado - Computer Communications, 2016 - Elsevier
Sundaresan et al. proposed recently a novel ownership transfer protocol for multi-tag multi-
owner RFID environments that complies with the EPC Class1 Generation2 standard. The …