About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Global Security, Safety and Sustainability & e-Democracy. 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers

Research Article

Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags

Download(Requires a free EAI acccount)
539 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-33448-1_26,
        author={Hoda Jannati and Abolfazl Falahati},
        title={Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags},
        proceedings={Global Security, Safety and Sustainability \& e-Democracy. 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers},
        proceedings_a={ICGS3 \& E-DEMOCRACY},
        year={2012},
        month={10},
        keywords={de-synchronization attack grouping proof ownership transfer RFID tags},
        doi={10.1007/978-3-642-33448-1_26}
    }
    
  • Hoda Jannati
    Abolfazl Falahati
    Year: 2012
    Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags
    ICGS3 & E-DEMOCRACY
    Springer
    DOI: 10.1007/978-3-642-33448-1_26
Hoda Jannati1,*, Abolfazl Falahati1,*
  • 1: Iran University of Science and Technology
*Contact email: hodajannati@iust.ac.ir, afalahati@iust.ac.ir

Abstract

Ownership transfer and grouping proof protocols are the two most important requirements for RFID tag in various applications such as pharmaceutical distribution and manufacturing. In 2010, Zuo integrated these two requirements and introduced a protocol for RFID tag group ownership transfer (GOT), i.e., transferring the ownership of a group of tags in one session. However, this paper shows that Zuo’s protocol is vulnerable to de-synchronization attack and tag impersonating in the presence of cheating old owner. This paper also proposes solutions to fix the security flaws of Zuo’s GOT protocol.

Keywords
de-synchronization attack grouping proof ownership transfer RFID tags
Published
2012-10-08
http://dx.doi.org/10.1007/978-3-642-33448-1_26
Copyright © 2011–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL