Abstract
RFID-tagged items are highly likely to change ownerships during their lifetime. While there are more than a dozen ownership transfer protocols in extant literature, none of these address the issue of non-repudiation. We purport to fill this gap by proposing non-repudiation protocols with and without a trusted third party that seamlessly also transfer ownership of the tagged item.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
By optimistic law enforcement we mean that both parties can call upon law enforcement in case they feel cheated.
References
Cai, S., Li, T., Li, Y., Deng, R.H.: Ensuring dual security modes in RFID-enabled supply chain systems. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 372–383. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00843-6_32
van Deursen, T., Radomirović, S.: Security of an RFID protocol for supply chains. In: Proceedings of the 1st Workshop on Advances in RFID (AIR 2008), pp. 568–573. IEEE Computer Society, October 2008
Deursen, T., Mauw, S., Radomirović, S., Vullers, P.: Secure ownership and ownership transfer in RFID systems. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 637–654. Springer, Heidelberg (2009). doi:10.1007/978-3-642-04444-1_39
Danny, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)
Gutscher, A.: Reasoning with uncertain and conflicting opinions in open reputation systems. Electron. Notes Theoret. Comput. Sci. (ENTCS) 244, 67–79 (2009)
Henseler, M., Rossberg, M., Schaefer, G.: Credential management for automatic identification solutions in supply chain management. IEEE Trans. Industr. Inf. 4(4), 303–314 (2008)
Kapoor, G., Zhou, W., Piramuthu, S.: RFID and information security in supply chains. In: Proceedings of the 4th International Conference on Mobile Ad-hoc and Sensor Networks(MSN), pp. 59–62. IEEE Computer Society (2008)
Kim, K., Park, S., Baek, J.: Improving fairness and privacy of Zhou-Gollmann’s fair non-repudiation protocol. In: Proceedings of ICPP, Workshop on Security (IWSEC), pp. 140–145. IEEE Computer Society (1999)
Kremer, S., Raskin, J.-F.: A game-based verification of non-repudiation and fair exchange protocols. In: Larsen, K.G., Nielsen, M. (eds.) CONCUR 2001. LNCS, vol. 2154, pp. 551–565. Springer, Heidelberg (2001). doi:10.1007/3-540-44685-0_37
Li, Y., Ding, X.: Protecting RFID communications in supply chains. In: ASIACCS, pp. 234–241 (2007)
Li, G., Ogawa, M.: On-the-fly model checking of fair non-repudiation protocols. In: Namjoshi, K.S., Yoneda, T., Higashino, T., Okamura, Y. (eds.) ATVA 2007. LNCS, vol. 4762, pp. 511–522. Springer, Heidelberg (2007). doi:10.1007/978-3-540-75596-8_36
Li, L., Zhang, H.-G., Wang, L.-N.: An improved non-repudiation protocol and its security analysis. Wuhan Univ. J. Nat. Sci. 9(3), 288–292 (2004)
Louridas, P.: Some guidelines for non-repudiation protocols. ACM SIGCOMM Comput. Commun. Rev. 30(5), 29–38 (2000)
Markowitch, O., Kremer, S.: An optimistic non-repudiation protocol with transparent trusted third party. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 363–378. Springer, Heidelberg (2001). doi:10.1007/3-540-45439-X_25
Schapranow, M.-P., Zeier, A., Plattner, H.: A dynamic mutual RFID authentication model preventing unauthorized third party access. In: Proceedings of the 4th International Conference on Network and System Security (2010)
Sessler, G.M., West, J.E.: Secure multi-party non-repudiation protocols and applications. In: Sessler, G.M. (ed.) Electrets. TAP, vol. 33, pp. 347–381. Springer, Heidelberg (1980). doi:10.1007/3540173358_15
Petropoulos, D., Kotzanikolaou, P.: Some more improvements on a fair non-repudiation protocol. J. Internet Technol. 4(4), 255–259 (2003)
Santiago, J.S., Vigneron, L.: Study for automatically analysing non-repudiation. In: Dans les actes du 1er Colloque sur les Risques et la Scurit d’Internet et des Systmes, CRiSIS, pp. 157–171, Bourges, France, October 2005
Zhou, J., Gollmann, D.: A fair non-repudiation protocol. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 55–61 (1996)
Zhou, J., Gollmann, D.: An efficient non-repudiation protocol. In: Proceedings of IEEE Computer Security Foundations Workshop, pp. 126–132 (1997)
Acknowledgement
The idea for this paper came from discussions with Saša Radomirović. I gratefully acknowledge Saša’s help with discussions on the security of RFID ownership transfer protocols. All error(s) remain my own.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Piramuthu, S. (2017). RFID-Based Non-repudiation Protocols for Supply Chains. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2017. Communications in Computer and Information Science, vol 759. Springer, Cham. https://doi.org/10.1007/978-3-319-65548-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-65548-2_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65547-5
Online ISBN: 978-3-319-65548-2
eBook Packages: Computer ScienceComputer Science (R0)