學術產出-Periodical Articles

Article View/Open

Publication Export

Google ScholarTM

政大圖書館

Citation Infomation

題名 On group ownership delegate protocol for RFID systems
作者 杜雨儒
Yu-Ju Tu
Kapoor , Gaurav
Piramuthu, Selwyn
貢獻者 資管系
關鍵詞 RFID ; group ownership transfer ; authentication ; vulnerabilities
日期 2021-07
上傳時間 2022-01-06
摘要 As RFID tags identify objects at the item level, proper authentication of these tags is of paramount importance in RFID-based systems. While RFID tag authentication in systems where these tags are assigned to be read by a single reader is challenging enough due to resource constraints related to memory and processing power at the tag’s side, it is not uncommon for RFID tags to be read by multiple readers. Even more, when an item moves between owners, ownership of the RFID tagged item needs to be updated to reflect reality. As authentication protocols play a critical role in RFID-based systems, it is necessary to ensure that any developed protocol is free from vulnerabilities that can be taken advantage by an adversary to mount attacks on the system. Lee et al. (Information Systems Frontiers, 21, 1153-1166, 2019) develop group ownership authentication protocols for a group of RFID-tagged items that simultaneously switch ownership. We evaluate the protocols in Lee et al. (Information Systems Frontiers, 21, 1153-1166, 2019) and identify several critical vulnerabilities. We then discuss the sources of these vulnerabilities and common precautions that should be taken to avoid such vulnerabilities.
關聯 Information Systems Frontiers, Vol.24, pp.1577-1584
資料類型 article
DOI https://doi.org/10.1007/s10796-021-10177-x
dc.contributor 資管系-
dc.creator (作者) 杜雨儒-
dc.creator (作者) Yu-Ju Tu-
dc.creator (作者) Kapoor , Gaurav-
dc.creator (作者) Piramuthu, Selwyn-
dc.date (日期) 2021-07-
dc.date.accessioned 2022-01-06-
dc.date.available 2022-01-06-
dc.date.issued (上傳時間) 2022-01-06-
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/138628-
dc.description.abstract (摘要) As RFID tags identify objects at the item level, proper authentication of these tags is of paramount importance in RFID-based systems. While RFID tag authentication in systems where these tags are assigned to be read by a single reader is challenging enough due to resource constraints related to memory and processing power at the tag’s side, it is not uncommon for RFID tags to be read by multiple readers. Even more, when an item moves between owners, ownership of the RFID tagged item needs to be updated to reflect reality. As authentication protocols play a critical role in RFID-based systems, it is necessary to ensure that any developed protocol is free from vulnerabilities that can be taken advantage by an adversary to mount attacks on the system. Lee et al. (Information Systems Frontiers, 21, 1153-1166, 2019) develop group ownership authentication protocols for a group of RFID-tagged items that simultaneously switch ownership. We evaluate the protocols in Lee et al. (Information Systems Frontiers, 21, 1153-1166, 2019) and identify several critical vulnerabilities. We then discuss the sources of these vulnerabilities and common precautions that should be taken to avoid such vulnerabilities.-
dc.format.extent 809127 bytes-
dc.format.mimetype application/pdf-
dc.relation (關聯) Information Systems Frontiers, Vol.24, pp.1577-1584-
dc.subject (關鍵詞) RFID ; group ownership transfer ; authentication ; vulnerabilities-
dc.title (題名) On group ownership delegate protocol for RFID systems-
dc.type (資料類型) article-
dc.identifier.doi (DOI) 10.1007/s10796-021-10177-x-
dc.doi.uri (DOI) https://doi.org/10.1007/s10796-021-10177-x-