A secure elliptic curve based RFID ownership transfer scheme with controlled delegation

Shu Cheng, Vijay Varadharajan, Yi Mu, Willy Susilo

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

4 Citations (Scopus)

Abstract

In practical applications, the owner of an RFID-tagged item canchange. In this paper, we propose a new RFID ownership transfer protocol using elliptic-curve cryptography. The paper first considers security and privacy requirements in the ownership transfer process. Then the paper provides a detailed description of our ownership transfer scheme outlining various protocol phases. Key features of the proposed scheme are that it allows controlled delegation and authorisation recovery, and the ownership transfer is achieved without a trusted third party. We describe a security analysis of the proposed scheme and demonstrate that it meets the desired security and privacy requirements. We also illustrate the performance results and show that our scheme is feasible for lightweight RFID tags.

Original languageEnglish
Title of host publicationRadio Frequency Identification System Security:
Subtitle of host publicationRFIDsec'13 Asia Workshop Proceedings
EditorsChangshe Ma, Jian Weng
Place of PublicationAmsterdam
PublisherIOS Press
Pages31-43
Number of pages13
Volume11
ISBN (Electronic)9781614993285
ISBN (Print)9781614993278
DOIs
Publication statusPublished - 2013
EventWorkshop on Radio Frequency Identification/Internet of Things Security: RFIDsec'13 Asia - South China Normal University and Jinan University, Guangzhou, China
Duration: 27 Nov 201327 Nov 2013

Publication series

NameCryptology and Information Security Series
Volume11
ISSN (Print)18716431
ISSN (Electronic)18798101

Workshop

WorkshopWorkshop on Radio Frequency Identification/Internet of Things Security
Country/TerritoryChina
CityGuangzhou
Period27/11/1327/11/13

Fingerprint

Dive into the research topics of 'A secure elliptic curve based RFID ownership transfer scheme with controlled delegation'. Together they form a unique fingerprint.

Cite this