Skip to main content

RFID-Based Non-repudiation Protocols for Supply Chains

  • Conference paper
  • First Online:
Book cover Future Network Systems and Security (FNSS 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 759))

Included in the following conference series:

Abstract

RFID-tagged items are highly likely to change ownerships during their lifetime. While there are more than a dozen ownership transfer protocols in extant literature, none of these address the issue of non-repudiation. We purport to fill this gap by proposing non-repudiation protocols with and without a trusted third party that seamlessly also transfer ownership of the tagged item.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    By optimistic law enforcement we mean that both parties can call upon law enforcement in case they feel cheated.

References

  1. Cai, S., Li, T., Li, Y., Deng, R.H.: Ensuring dual security modes in RFID-enabled supply chain systems. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 372–383. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00843-6_32

    Chapter  Google Scholar 

  2. van Deursen, T., Radomirović, S.: Security of an RFID protocol for supply chains. In: Proceedings of the 1st Workshop on Advances in RFID (AIR 2008), pp. 568–573. IEEE Computer Society, October 2008

    Google Scholar 

  3. Deursen, T., Mauw, S., Radomirović, S., Vullers, P.: Secure ownership and ownership transfer in RFID systems. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 637–654. Springer, Heidelberg (2009). doi:10.1007/978-3-642-04444-1_39

    Chapter  Google Scholar 

  4. Danny, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  5. Gutscher, A.: Reasoning with uncertain and conflicting opinions in open reputation systems. Electron. Notes Theoret. Comput. Sci. (ENTCS) 244, 67–79 (2009)

    Article  Google Scholar 

  6. Henseler, M., Rossberg, M., Schaefer, G.: Credential management for automatic identification solutions in supply chain management. IEEE Trans. Industr. Inf. 4(4), 303–314 (2008)

    Article  Google Scholar 

  7. Kapoor, G., Zhou, W., Piramuthu, S.: RFID and information security in supply chains. In: Proceedings of the 4th International Conference on Mobile Ad-hoc and Sensor Networks(MSN), pp. 59–62. IEEE Computer Society (2008)

    Google Scholar 

  8. Kim, K., Park, S., Baek, J.: Improving fairness and privacy of Zhou-Gollmann’s fair non-repudiation protocol. In: Proceedings of ICPP, Workshop on Security (IWSEC), pp. 140–145. IEEE Computer Society (1999)

    Google Scholar 

  9. Kremer, S., Raskin, J.-F.: A game-based verification of non-repudiation and fair exchange protocols. In: Larsen, K.G., Nielsen, M. (eds.) CONCUR 2001. LNCS, vol. 2154, pp. 551–565. Springer, Heidelberg (2001). doi:10.1007/3-540-44685-0_37

    Chapter  Google Scholar 

  10. Li, Y., Ding, X.: Protecting RFID communications in supply chains. In: ASIACCS, pp. 234–241 (2007)

    Google Scholar 

  11. Li, G., Ogawa, M.: On-the-fly model checking of fair non-repudiation protocols. In: Namjoshi, K.S., Yoneda, T., Higashino, T., Okamura, Y. (eds.) ATVA 2007. LNCS, vol. 4762, pp. 511–522. Springer, Heidelberg (2007). doi:10.1007/978-3-540-75596-8_36

    Chapter  Google Scholar 

  12. Li, L., Zhang, H.-G., Wang, L.-N.: An improved non-repudiation protocol and its security analysis. Wuhan Univ. J. Nat. Sci. 9(3), 288–292 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  13. Louridas, P.: Some guidelines for non-repudiation protocols. ACM SIGCOMM Comput. Commun. Rev. 30(5), 29–38 (2000)

    Article  Google Scholar 

  14. Markowitch, O., Kremer, S.: An optimistic non-repudiation protocol with transparent trusted third party. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 363–378. Springer, Heidelberg (2001). doi:10.1007/3-540-45439-X_25

    Chapter  Google Scholar 

  15. Schapranow, M.-P., Zeier, A., Plattner, H.: A dynamic mutual RFID authentication model preventing unauthorized third party access. In: Proceedings of the 4th International Conference on Network and System Security (2010)

    Google Scholar 

  16. Sessler, G.M., West, J.E.: Secure multi-party non-repudiation protocols and applications. In: Sessler, G.M. (ed.) Electrets. TAP, vol. 33, pp. 347–381. Springer, Heidelberg (1980). doi:10.1007/3540173358_15

    Chapter  Google Scholar 

  17. Petropoulos, D., Kotzanikolaou, P.: Some more improvements on a fair non-repudiation protocol. J. Internet Technol. 4(4), 255–259 (2003)

    Google Scholar 

  18. Santiago, J.S., Vigneron, L.: Study for automatically analysing non-repudiation. In: Dans les actes du 1er Colloque sur les Risques et la Scurit d’Internet et des Systmes, CRiSIS, pp. 157–171, Bourges, France, October 2005

    Google Scholar 

  19. Zhou, J., Gollmann, D.: A fair non-repudiation protocol. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 55–61 (1996)

    Google Scholar 

  20. Zhou, J., Gollmann, D.: An efficient non-repudiation protocol. In: Proceedings of IEEE Computer Security Foundations Workshop, pp. 126–132 (1997)

    Google Scholar 

Download references

Acknowledgement

The idea for this paper came from discussions with Saša Radomirović. I gratefully acknowledge Saša’s help with discussions on the security of RFID ownership transfer protocols. All error(s) remain my own.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Selwyn Piramuthu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Piramuthu, S. (2017). RFID-Based Non-repudiation Protocols for Supply Chains. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2017. Communications in Computer and Information Science, vol 759. Springer, Cham. https://doi.org/10.1007/978-3-319-65548-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65548-2_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65547-5

  • Online ISBN: 978-3-319-65548-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics