Study of Two Functional Requirements, Tag Delegation and Ownership Transfer in RFID System

Authors

  • Masawood Alam Research Scholar, Department of Physics, J. P. University, Chapra, Bihar, India Author
  • Prof. Gun Sagar Yadav University Department of Physics, J. P. University, Chapra, Bihar, India Author

DOI:

https://doi.org/10.32628/IJSRST25123172

Keywords:

RFID, Privacy & Security, Authentication

Abstract

In this present paper, we consider two functional requirements, tag delegation and ownership transfer, that are likely to be required in some RFID systems. [1-6].

Downloads

Download data is not yet available.

References

Ela Innovation, SA. (2014) Ela Innovation active RFID tag and reader manufacturer. Available online: http://www.rfid-ela.eu/ (accessed on 20 July 2015).

Hoppe, R.; Wölfle, G.; Jakobus, U. Wave propagation and radio network planning software WinProp added to the electromagnetic solver package FEKO. In Proceedings of the International Applied Computational Electromagnetics Society Symposium, Firenze, Italy, 26–30 March 2017; pp. 1–2. DOI: https://doi.org/10.23919/ROPACES.2017.7916282

Zhu, A.; Fan, T.; Gu, Z.; Lv, Q.; Li, C.; Ran, L. Indoor localization based on a single-tone SIMO-structured Doppler radar system. In Proceedings of the 2018 IEEE Radio and Wireless Symposium (RWS), Anaheim, CA, USA, 15–18 January 2018. DOI: https://doi.org/10.1109/RWS.2018.8304931

Hatem, E.; Colin, E.; Abou-Chakra, S.; El-Hassan, B.; Laheurte, J.-M. Constellations of active UHF-RFID tags for indoor positioning. In Proceedings of the International Conference on Indoor Positioning and Indoor Navigation (IPIN), Nantes, France, 24–27 September 2018; pp. 1–4. DOI: https://doi.org/10.1109/RFID-TA.2018.8552832

Hatem, E.; Colin, E.; Abou-Chakra, S.; El-Hassan, B.; Laheurte, J.-M. 3D Modeling for Propagation of UHF-RFID Tags’ Signals in an Indoor Environment. In Proceedings of the 2nd IEEE Middle East and North Africa Communications Conference (MENACOMM), Manama, Bahrain, 19–21 November 2019; pp. 1–6. DOI: https://doi.org/10.1109/MENACOMM46666.2019.8988525

C. Lim and T. Kwon. Strong and robust RFID authentication enabling perfect ownership transfer. In P. Ning, S. Qing, and N. Li, editors, Conference on Information and Communications Security | ICICS '06, volume 4307 of Lecture Notes in Computer Science, pages 1{20, Raleigh, North Carolina, USA, December 2006. Springer-Verlag. DOI: https://doi.org/10.1007/11935308_1

H. Bar-El. Introduction to side channel attacks. White paper, Discretix Technologies Ltd., October 2002.

L. E. Miller, Indoor Navigation for First Responders: A Feasibility Study, Technical Report, National Institute of Standards and Technology, (2006).

A. Juels. Minimalist Cryptography for Low-Cost RFID Tags. In C. Blundo and S. Cimato, editors, International Conference on Security in Communication Networks | SCN 2004, volume 3352 of Lecture Notes in Computer Science, pages 149{164, Amal, Italia, September 2004. Springer-Verlag. DOI: https://doi.org/10.1007/978-3-540-30598-9_11

B. Song. Server Impersonation Attacks on RFID Protocols. In Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies UBICOMM 08, pages 50{55, Valencia, Spain, October 2008. IEEE Computer Society. DOI: https://doi.org/10.1109/UBICOMM.2008.55

H. Chien and C. Chen. Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards & Interfaces, 29(2):254-259, February2007. DOI: https://doi.org/10.1016/j.csi.2006.04.004

D. N. Duc, J. Park, H. Lee, and K. Kim. Enhancing security of EPCglobal gen-2 RFID tag against traceability and cloning. In Symposium on Cryptography and Information Security | SCIS 2006, Hiroshima, Japan, January 2006. The Institute of Electronics, Information and Communication Engineers.

T. van Le, M. Burmester, and B. de Medeiros. Universally composableand forward secure RFID authentication and authenticated key exchange. In R. Deng and P. Samarati, editors, ACM Symposium on information, Computer and Communications Security | ASIACCS '07, pages 242{252, New York, NY, USA, March 2007. ACM Press. DOI: https://doi.org/10.1145/1229285.1229319

S. Karthikeyan and N. Nesterenko. RFID security without extensive cryptography. In Workshop on Security of Ad Hoc and Sensor Networks SASN '05, pages 63- 67, Alexandria, Virginia, USA, November 2005. ACM Press. DOI: https://doi.org/10.1145/1102219.1102229

Istvfan Vajda and Levente Butty_an. Lightweight authentication protocols for low- cost RFID tags. In Second Workshop on Security in Ubiquitous Computing Ubicomp 2003, Seattle, WA, USA, October 2003.

D. W. Nance and T. L. Naps. Introduction to Computer Science: Programming, Problem Solving and Data Structures. West Publishing Company, second edition, 1992.

J. F. Korsh. Data Structures, Algorithms and Program Style. PWS Publishing Co. Boston, MA, USA, 1986.

Y. Zhang and P. Kitsos. Security in RFID and Sensor Networks. Auerbach Publications, April 2009.

D. Molnar, A. Soppera, and D. Wagner. A scalable, delegatable pseudonymprotocol enabling ownership transfer of RFID tags. In B. Preneel and S. Tavares,editors, Selected Areas in Cryptography | SAC 2005, volume 3897 of Lecture Notes in Computer Science, pages 276{290, Kingston, Canada, August 2005. Springer-Verlag. DOI: https://doi.org/10.1007/11693383_19

K. Emery, Distributed Eventing Architecture: RFID and Sensors in a Supply Chain, Master Thesis, MIT http://db.lcs.mit.edu/madden/html/theses/emery.pdf.

EPCglobal, Class 1 Generation 2 UHF Air Interface Protocol Standard, Version 1.0.9, (2005).

Downloads

Published

03-08-2025

Issue

Section

Research Articles

How to Cite

[1]
Masawood Alam and Prof. Gun Sagar Yadav, Trans., “Study of Two Functional Requirements, Tag Delegation and Ownership Transfer in RFID System”, Int J Sci Res Sci & Technol, vol. 12, no. 4, pp. 1207–1212, Aug. 2025, doi: 10.32628/IJSRST25123172.