An efficient and secure RFID security method with ownership transfer

Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

42 Citations (Scopus)

Abstract

Radio Frequency Identification (RFID) has come under the spotlight as technology supporting ubiquitous society. But now, we face several security problems and challenges in RFID systems. Recent papers have reported that RFID systems have to achieve the following requirements: (1) Indistinguishability, (2) Forward Security, (3) Replay Attack resistance, (4) Tag Killing resistance, and (5) Ownership Transferability. We have to design RFID system that achieves the above-mentioned requirements. The previous security methods achieve only some of them individually, and no RFID system has been constructed that achieves all requirements. In this paper, we propose an RFID security method that achieves all requirements based on a hash function and a symmetric key cryptosystem. In addition, our proposed method provides not only high-security but also high-efficiency.

Original languageEnglish
Title of host publicationComputational Intelligence and Security - International Conference, CIS 2006, Revised Selected Papers
PublisherSpringer Verlag
Pages778-787
Number of pages10
ISBN (Print)9783540743767
DOIs
Publication statusPublished - 2007
Externally publishedYes
EventInternational Conference on Computational Intelligence and Security, CIS 2006 - Guangzhou, China
Duration: Nov 3 2006Nov 6 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4456 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherInternational Conference on Computational Intelligence and Security, CIS 2006
Country/TerritoryChina
CityGuangzhou
Period11/3/0611/6/06

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'An efficient and secure RFID security method with ownership transfer'. Together they form a unique fingerprint.

Cite this