Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A Privacy-Preserving Ownership Transfer Protocol for RFID Tags Under Supply Chain

  • Conference paper
  • First Online:
Frontier Computing (FC 2020)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 747))

Included in the following conference series:

  • 24 Accesses

Abstract

In a series of business activities supported by RFID technology, ensuring the security of relevant business information data of each enterprise in the supply chain is the key task of the technology. With the continuous development of the Internet of things, the confidential ownership of FID tags in the supply chain circulation will change, which may result in information leakage, posing a threat to the owner's information security. Therefore, it is of great significance to study the confidential ownership transfer protocol. The purpose of this paper is to ensure the information and data security of RFID tags to the greatest extent through the study of the confidential ownership transfer protocol of RFID tags in the supply chain. This article first to the RFID technology as well as the transfer of the label information under the environment of supply chain in detail and then on the basis of the existing data presents a transfer of the ownership of the confidentiality agreement with anti-counterfeiting recognition, namely AC-OTP agreement, the agreement to illustrate the specific work process; finally, the paper proposed transfer protocol analysis of the feasibility and validity was tested.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Cui, P.Y. 2016. An improved ownership transfer and mutual authentication for lightweight RFID protocols. International Journal of Network Security 18 (6): 1173–1179.

    Google Scholar 

  2. Moriyama, D. 2016. Cryptanalysis and improvement of a provably secure RFID ownership transfer protocol. IEICE Transactions on Fundamentals of Electronics Communications & Computer Sciences E99.A (1): 130–138.

    Google Scholar 

  3. Munilla, J., M. Burmester, and A. Peinado. 2016. RFID ownership transfer with positive secrecy capacity channels. Sensors 17 (1): 53.

    Article  Google Scholar 

  4. Xie, R., B.Y. Jian, and D.W. Liu. 2018. An improved ownership transfer for RFID protocol. International Journal of Network Security 20 (1): 149–156.

    Google Scholar 

  5. Guo, Fuchun, Yi Mu, & Willy Susilo. 2017. Privacy-preserving mutual authentication in RFID with designated readers. Wireless Personal Communications 96 (3): 1–27.

    Google Scholar 

  6. Hong-Yan, K. 2016. Analysis and improvement of ECC-based grouping-proof protocol for RFID. International Journal of Control & Automation 9 (7): 343–352.

    Article  Google Scholar 

  7. Qian, J., B. Fan, and X. Zhang. 2017. Temperature monitoring in cold chain chamber based on temperature sensing RFID labels. Transactions of the Chinese Society of Agricultural Engineering 33 (21): 282–288.

    Google Scholar 

  8. Ham, H.M., J.H. Lee, and J.S. Song. 2017. Improved yoking proof protocols for preserving anonymity. International Journal of Information Security 17 (8): 1–15.

    Google Scholar 

  9. Monnai, Y., Y. Makino, and H. Shinoda. 2016. Numerical study on left-handed transmissions line incorporated inside large area flooring tiles for RFID signal transmission. IEEJ Transactions on Sensors & Micromachines 136 (7): 283–288.

    Article  Google Scholar 

  10. Tian, Y., G. Yang, and Y. Mu. 2016. Privacy-preserving yoking proof with key exchange in the three-party setting. Wireless Personal Communications 94 (3): 1–18.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Feng Xiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xiao, F. (2021). A Privacy-Preserving Ownership Transfer Protocol for RFID Tags Under Supply Chain. In: Chang, JW., Yen, N., Hung, J.C. (eds) Frontier Computing. FC 2020. Lecture Notes in Electrical Engineering, vol 747. Springer, Singapore. https://doi.org/10.1007/978-981-16-0115-6_70

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-0115-6_70

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-0114-9

  • Online ISBN: 978-981-16-0115-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics