Skip to main content
placeholder image

Secure RFID ownership transfer protocols

Journal Article


Download full-text (Open Access)

Abstract


  • An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of the tag is instituted by the supplier who initially owns the tag. In the view of a buyer, the validity of the current tag ownership and the originality of supplier are most important. In typical RFID ownership transfer protocols, the knowledge of the tag's authentication key proves the ownership. However, it is insufficient against an active attacker, since tags are usually lack of tamper-proof protections. Ownership transfer relies on a successful verification of tag's supplier and current ownership. In this paper, we formally define the security model of ownership transfer protocols and propose a secure ownership transfer protocol. In our scheme, current owner provides a new owner with the evidence of transfer and a proof of tag origin. Key management becomes easy in our system, since the one asymmetric verification key of the owner can be used to verify multiple tags that belong to the owner.

UOW Authors


  •   LI, Nan (external author)
  •   Mu, Yi (external author)
  •   Susilo, Willy
  •   Varadharajan, Vijay (external author)

Publication Date


  • 2013

Citation


  • LI, N., Mu, Y., Susilo, W. & Varadharajan, V. (2013). Secure RFID ownership transfer protocols. Lecture Notes in Computer Science, 7863 189-203.

Scopus Eid


  • 2-s2.0-84883426672

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=2621&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/1612

Number Of Pages


  • 14

Start Page


  • 189

End Page


  • 203

Volume


  • 7863

Abstract


  • An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of the tag is instituted by the supplier who initially owns the tag. In the view of a buyer, the validity of the current tag ownership and the originality of supplier are most important. In typical RFID ownership transfer protocols, the knowledge of the tag's authentication key proves the ownership. However, it is insufficient against an active attacker, since tags are usually lack of tamper-proof protections. Ownership transfer relies on a successful verification of tag's supplier and current ownership. In this paper, we formally define the security model of ownership transfer protocols and propose a secure ownership transfer protocol. In our scheme, current owner provides a new owner with the evidence of transfer and a proof of tag origin. Key management becomes easy in our system, since the one asymmetric verification key of the owner can be used to verify multiple tags that belong to the owner.

UOW Authors


  •   LI, Nan (external author)
  •   Mu, Yi (external author)
  •   Susilo, Willy
  •   Varadharajan, Vijay (external author)

Publication Date


  • 2013

Citation


  • LI, N., Mu, Y., Susilo, W. & Varadharajan, V. (2013). Secure RFID ownership transfer protocols. Lecture Notes in Computer Science, 7863 189-203.

Scopus Eid


  • 2-s2.0-84883426672

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=2621&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/1612

Number Of Pages


  • 14

Start Page


  • 189

End Page


  • 203

Volume


  • 7863