Dimitriou, 2008 - Google Patents
rfidDOT: RFID delegation and ownership transfer made simpleDimitriou, 2008
View PDF- Document ID
- 7967092463635418039
- Author
- Dimitriou T
- Publication year
- Publication venue
- Proceedings of the 4th international conference on Security and privacy in communication netowrks
External Links
Snippet
In this work we introduce rfidDOT, a protocol for secure access, delegation and ownership transfer of tags along with a model for formally defining privacy in such an environment. As current RFID tags emit constant identifiers that may help in identifying user habits and …
- 238000010367 cloning 0 abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of the preceding main groups, e.g. automatic card files incorporating conveying and reading operations
- G06K2017/0035—Aspects not covered by other subgroups
- G06K2017/0045—Tracking objects or persons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading, distribution or shipping; Inventory or stock management, e.g. order filling, procurement or balancing against orders
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dimitriou | rfidDOT: RFID delegation and ownership transfer made simple | |
Lim et al. | Strong and robust RFID authentication enabling perfect ownership transfer | |
Duc et al. | Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning | |
Cho et al. | Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol | |
Aggarwal et al. | RFID security in the context of" internet of things" | |
Toiruul et al. | An advanced mutual-authentication algorithm using AES for RFID systems | |
Chen et al. | RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards. | |
Sadeghi et al. | User privacy in transport systems based on RFID e-tickets | |
CN106411505B (en) | A kind of mutual authentication method and Mobile RFID system of Mobile RFID | |
Chen et al. | An ownership transfer scheme using mobile RFIDs | |
Dimitriou | Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags | |
Gharooni et al. | A confidential RFID model to prevent unauthorized access | |
Zhou et al. | A lightweight anti-desynchronization RFID authentication protocol | |
Chien | The study of RFID authentication protocols and security of some popular RFID tags | |
Won et al. | Strong authentication protocol for secure RFID tag search without help of central database | |
Kim et al. | MARP: Mobile agent for RFID privacy protection | |
Ranasinghe et al. | Confronting security and privacy threats in modern RFID systems | |
Zhang et al. | Security Requirements for RFID Computing Systems. | |
Bilal | Addressing security and privacy issues in low-cost RFID systems | |
KR101162626B1 (en) | A secure and efficient method and RFID reader device of searching a RFID tag | |
Queisser et al. | Cataloging RFID Privacy and Security | |
Dimitriou | Proxy framework for enhanced RFID security and privacy | |
Wu et al. | RFID System Security | |
Sandhya et al. | A secure and efficient authentication protocol for mobile RFID systems. | |
Omer et al. | Mutual authentication protocols for RFID systems |