Abstract
In a series of business activities supported by RFID technology, ensuring the security of relevant business information data of each enterprise in the supply chain is the key task of the technology. With the continuous development of the Internet of things, the confidential ownership of FID tags in the supply chain circulation will change, which may result in information leakage, posing a threat to the owner's information security. Therefore, it is of great significance to study the confidential ownership transfer protocol. The purpose of this paper is to ensure the information and data security of RFID tags to the greatest extent through the study of the confidential ownership transfer protocol of RFID tags in the supply chain. This article first to the RFID technology as well as the transfer of the label information under the environment of supply chain in detail and then on the basis of the existing data presents a transfer of the ownership of the confidentiality agreement with anti-counterfeiting recognition, namely AC-OTP agreement, the agreement to illustrate the specific work process; finally, the paper proposed transfer protocol analysis of the feasibility and validity was tested.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cui, P.Y. 2016. An improved ownership transfer and mutual authentication for lightweight RFID protocols. International Journal of Network Security 18 (6): 1173–1179.
Moriyama, D. 2016. Cryptanalysis and improvement of a provably secure RFID ownership transfer protocol. IEICE Transactions on Fundamentals of Electronics Communications & Computer Sciences E99.A (1): 130–138.
Munilla, J., M. Burmester, and A. Peinado. 2016. RFID ownership transfer with positive secrecy capacity channels. Sensors 17 (1): 53.
Xie, R., B.Y. Jian, and D.W. Liu. 2018. An improved ownership transfer for RFID protocol. International Journal of Network Security 20 (1): 149–156.
Guo, Fuchun, Yi Mu, & Willy Susilo. 2017. Privacy-preserving mutual authentication in RFID with designated readers. Wireless Personal Communications 96 (3): 1–27.
Hong-Yan, K. 2016. Analysis and improvement of ECC-based grouping-proof protocol for RFID. International Journal of Control & Automation 9 (7): 343–352.
Qian, J., B. Fan, and X. Zhang. 2017. Temperature monitoring in cold chain chamber based on temperature sensing RFID labels. Transactions of the Chinese Society of Agricultural Engineering 33 (21): 282–288.
Ham, H.M., J.H. Lee, and J.S. Song. 2017. Improved yoking proof protocols for preserving anonymity. International Journal of Information Security 17 (8): 1–15.
Monnai, Y., Y. Makino, and H. Shinoda. 2016. Numerical study on left-handed transmissions line incorporated inside large area flooring tiles for RFID signal transmission. IEEJ Transactions on Sensors & Micromachines 136 (7): 283–288.
Tian, Y., G. Yang, and Y. Mu. 2016. Privacy-preserving yoking proof with key exchange in the three-party setting. Wireless Personal Communications 94 (3): 1–18.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xiao, F. (2021). A Privacy-Preserving Ownership Transfer Protocol for RFID Tags Under Supply Chain. In: Chang, JW., Yen, N., Hung, J.C. (eds) Frontier Computing. FC 2020. Lecture Notes in Electrical Engineering, vol 747. Springer, Singapore. https://doi.org/10.1007/978-981-16-0115-6_70
Download citation
DOI: https://doi.org/10.1007/978-981-16-0115-6_70
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0114-9
Online ISBN: 978-981-16-0115-6
eBook Packages: Computer ScienceComputer Science (R0)