An efficient and secure RFID security method with ownership transfer

Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

35 Citations (Scopus)

Abstract

Radio Frequency Identification (RFID) has come under the spotlight as technology supporting ubiquitous society. But now, we face several security problems and challenges in RFID systems. Recent papers have reported that RFID systems have to achieve the following requirements: (1) Indistinguishability, (2) Forward Security, (3) Replay Attack resistance, (4) Tag Killing resistance, and (5) Ownership Transferability. We have to design RFID system that achieves the above-mentioned requirements. The previous security methods achieve only some of them individually, and no RFID system has been constructed that achieves all requirements. In this paper, we propose an RFID security method that achieves all requirements based on a hash function and a symmetric key cryptosystem. In addition, our proposed method provides not only high-security but also high-efficiency.

Original languageEnglish
Title of host publicationComputational Intelligence and Security - International Conference, CIS 2006, Revised Selected Papers
Pages778-787
Number of pages10
Publication statusPublished - 2007 Dec 1
EventInternational Conference on Computational Intelligence and Security, CIS 2006 - Guangzhou, China
Duration: 2006 Nov 32006 Nov 6

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4456 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Computational Intelligence and Security, CIS 2006
CountryChina
CityGuangzhou
Period06/11/306/11/6

    Fingerprint

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Osaka, K., Takagi, T., Yamazaki, K., & Takahashi, O. (2007). An efficient and secure RFID security method with ownership transfer. In Computational Intelligence and Security - International Conference, CIS 2006, Revised Selected Papers (pp. 778-787). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4456 LNAI).