Abstract
A majority of existing RFID authentication protocols consider tagged items that are independent of other tagged items. However, as RFID tags permeate to item-level granularity where several items comprise an object of interest there is a need to develop protocols that seamlessly accommodate inclusion and exclusion of tags on such an object. We propose protocols for this scenario.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bustillo, M.: Wal-Mart radio tags to track clothing. Wall Street J. Bus. Technol. Sect. (2010)
Juels, A.: Yoking-Proofs for RFID tags. In: Proceedings of the First International Workshop on Pervasive Computing and Communication Security, pp. 138–143. IEEE Press (2004)
Kapoor, G., Piramuthu, S.: Single RFID tag ownership transfer protocols. IEEE Trans. Syst. Man. Cybern. Part C 42(2), 164–173 (2012)
Piramuthu, S.: Lightweight cryptographic authentication in passive RFID-tagged systems. IEEE Trans. Syst. Man Cybern. Part C 38(3), 360–376 (2008)
Piramuthu, S.: Inclusion/exclusion protocol for RFID tags. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds.) CCSIT 2011. CCIS, vol. 133, pp. 431–437. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-17881-8_41
Sundaresan, S., Doss, R., Zhou, W.L., Piramuthu, S.: Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy. Comput. Commun. 55, 112–124 (2015)
Acknowledgement
I thank Ton van Deursen for discussions/feedback during the writing of this paper. All error(s) remain my own.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Piramuthu, S. (2018). Authentication Protocols for an Object with Dynamic RFID Tags. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2018. Communications in Computer and Information Science, vol 878. Springer, Cham. https://doi.org/10.1007/978-3-319-94421-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-94421-0_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-94420-3
Online ISBN: 978-3-319-94421-0
eBook Packages: Computer ScienceComputer Science (R0)