Multi-tag and multi-owner RFID ownership transfer in supply chains

In any supply chain, there is a high likelihood for individual objects to change ownership at least once in their lifetime. As RFID tags enter the supply chain, these RFID-tagged objects should ideally be able to seamlessly accommodate ownership transfer issues while also accomplishing their primary intended purpose. Physical ownership transfer does not translate to strict ownership transfer in the presence of RFID tags given the wireless nature of communication with these tags. Moreover, whereas existing protocols implicitly assume a single tag that is owned by a single entity, it is not uncommon to encounter scenarios where tag ownership is shared among multiple entities. A dual of this is the case of an object with multiple tags. We consider ownership transfer scenarios for shared ownership transfer and single object with multiple RFID tags. In the multiple-tagged object case, we consider the possibility where objects gain and lose tags over time. We also present a protocol for simultaneous transfer of ownership of multiple tags between owners. Since ownership transfer without a trusted third party (TTP) is difficult to achieve, we propose a shared ownership sharing protocol and evaluate its properties.

[1]  Tassos Dimitriou rfidDOT: RFID delegation and ownership transfer made simple , 2008, SecureComm.

[2]  Selwyn Piramuthu,et al.  Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols , 2009, 2009 First International Conference on Networks & Communications.

[3]  Matthew J. B. Robshaw,et al.  An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .

[4]  Colin Boyd,et al.  Advances in Cryptology - ASIACRYPT 2001 , 2001 .

[5]  Liu Jian-guo,et al.  Mobile RFID security protocol and its GNY logic analysis , 2009 .

[6]  Ari Juels,et al.  "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[7]  Jin-Young Choi,et al.  A Secure Communication Protocol for Low-Cost RFID System , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).

[8]  林詠章,et al.  NONIDENTIFIABLE RFID PRIVACY PROTECTION WITH OWNERSHIP TRANSFER , 2010 .

[9]  Ming-Hour Yang,et al.  Lightweight authentication protocol for mobile RFID networks , 2010, Int. J. Secur. Networks.

[10]  B. Song RFID Tag Ownership Transfer , 2008 .

[11]  Selwyn Piramuthu,et al.  RFID mutual authentication protocols , 2011, Decis. Support Syst..

[12]  Eun-Jun Yoon,et al.  Two Security Problems of RFID Security Method with Ownership Transfer , 2008, 2008 IFIP International Conference on Network and Parallel Computing.

[13]  Zeng Yan Vendor-managed Inventory in Supply Chain , 2002 .

[14]  Tony Yu-Ju Tu,et al.  Identifying RFID-embedded objects in pervasive healthcare applications , 2009, Decis. Support Syst..

[15]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[16]  Florian Michahelles,et al.  The Dual Ownership Model A Concept for Efficient Access Management of Item-Level Data in Pharmaceutical Supply Chains , 2007 .

[17]  Colin Boyd,et al.  Examining Indistinguishability-Based Proof Models for Key Establishment Protocols , 2005, ASIACRYPT.

[18]  Walid I. Khedr,et al.  Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks , 2009, SECRYPT.

[19]  Jianfeng Ma,et al.  On the Security of the Canetti-Krawczyk Model , 2005, CIS.

[20]  Gyözö Gódor,et al.  Improved Lightweight Mutual Authentication Protocol for RFID Systems , 2008, MWCN/PWC.

[21]  Selwyn Piramuthu,et al.  Protocols for RFID tag/reader authentication , 2007, Decis. Support Syst..

[22]  Wei-Bin Lee,et al.  Enhancement of the RFID security method with ownership transfer , 2009, ICUIMC '09.

[23]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[24]  Chris J. Mitchell,et al.  Scalable RFID security protocols supporting tag ownership transfer , 2011, Comput. Commun..

[25]  Pekka Jäppinen,et al.  Enhanced RFID Security Method with Ownership Transfer , 2008, 2008 International Conference on Computational Intelligence and Security.

[26]  Selwyn Piramuthu,et al.  Single RFID Tag Ownership Transfer Protocols , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[27]  Yeong-Lin Lai,et al.  RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards , 2011, Int. J. Netw. Secur..

[28]  Kouichi Sakurai,et al.  Grouping proof for RFID tags , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).