[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Dimitriou, 2008 - Google Patents

rfidDOT: RFID delegation and ownership transfer made simple

Dimitriou, 2008

View PDF
Document ID
7967092463635418039
Author
Dimitriou T
Publication year
Publication venue
Proceedings of the 4th international conference on Security and privacy in communication netowrks

External Links

Snippet

In this work we introduce rfidDOT, a protocol for secure access, delegation and ownership transfer of tags along with a model for formally defining privacy in such an environment. As current RFID tags emit constant identifiers that may help in identifying user habits and …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of the preceding main groups, e.g. automatic card files incorporating conveying and reading operations
    • G06K2017/0035Aspects not covered by other subgroups
    • G06K2017/0045Tracking objects or persons
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading, distribution or shipping; Inventory or stock management, e.g. order filling, procurement or balancing against orders

Similar Documents

Publication Publication Date Title
Dimitriou rfidDOT: RFID delegation and ownership transfer made simple
Lim et al. Strong and robust RFID authentication enabling perfect ownership transfer
Duc et al. Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning
Cho et al. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
Aggarwal et al. RFID security in the context of" internet of things"
Toiruul et al. An advanced mutual-authentication algorithm using AES for RFID systems
Chen et al. RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards.
Sadeghi et al. User privacy in transport systems based on RFID e-tickets
CN106411505B (en) A kind of mutual authentication method and Mobile RFID system of Mobile RFID
Chen et al. An ownership transfer scheme using mobile RFIDs
Dimitriou Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags
Gharooni et al. A confidential RFID model to prevent unauthorized access
Zhou et al. A lightweight anti-desynchronization RFID authentication protocol
Chien The study of RFID authentication protocols and security of some popular RFID tags
Won et al. Strong authentication protocol for secure RFID tag search without help of central database
Kim et al. MARP: Mobile agent for RFID privacy protection
Ranasinghe et al. Confronting security and privacy threats in modern RFID systems
Zhang et al. Security Requirements for RFID Computing Systems.
Bilal Addressing security and privacy issues in low-cost RFID systems
KR101162626B1 (en) A secure and efficient method and RFID reader device of searching a RFID tag
Queisser et al. Cataloging RFID Privacy and Security
Dimitriou Proxy framework for enhanced RFID security and privacy
Wu et al. RFID System Security
Sandhya et al. A secure and efficient authentication protocol for mobile RFID systems.
Omer et al. Mutual authentication protocols for RFID systems