In this paper, we address the problem of ownership transfer of RFID tagged objects in Internet of Things (IoT) in a secure manner. In application domains such as supply chain management, RFID tagged objects are required to securely change hands several times during their life cycle. To this end, we propose a novel ownership transfer mechanism that securely transfers an RFID tagged objects in Internet of Things (IoT). An important property of the proposed approach is that the proposed ownership transfer mechanism ensures the security of both the RFID tagged objects and the object owners. We analysed the proposed object ownership transfer protocol both qualitatively and quantitatively to evaluate its effectiveness. The analysis shows that the...
Abstract: While a major of existing RFID security protocols address tag authentication issues, the a...
Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for I...
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifi...
In this paper, we address the problem of ownership transfer of RFID tagged objects in Internet of Th...
Radio Frequency Identification (RFID) has been widely adopted in practice for objects identification...
[[abstract]]Due to the advancement of convenience technology for people, the era of Internet of Thin...
With the increasing number of IoT devices deployed, the problem of switching ownership of devices is...
RFID technology is increasingly become popular in supply chain management. When passing tags on to t...
Existing business models require RFID tag to transfer its ownership during its life cycle. As a resu...
An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of t...
In the RFID system a tag is attached to an object which might own by a number of people during its l...
In the real society, the owner of a tagged object may transfer its ownership to another party. An ow...
RFID and Cloud computing are widely used in the IoT (Internet of Things). However, there are few res...
In practical applications, the owner of an RFID-tagged item canchange. In this paper, we propose a n...
Radio frequency identification (RFID) is a modern approach to identify and track several assets at o...
Abstract: While a major of existing RFID security protocols address tag authentication issues, the a...
Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for I...
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifi...
In this paper, we address the problem of ownership transfer of RFID tagged objects in Internet of Th...
Radio Frequency Identification (RFID) has been widely adopted in practice for objects identification...
[[abstract]]Due to the advancement of convenience technology for people, the era of Internet of Thin...
With the increasing number of IoT devices deployed, the problem of switching ownership of devices is...
RFID technology is increasingly become popular in supply chain management. When passing tags on to t...
Existing business models require RFID tag to transfer its ownership during its life cycle. As a resu...
An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of t...
In the RFID system a tag is attached to an object which might own by a number of people during its l...
In the real society, the owner of a tagged object may transfer its ownership to another party. An ow...
RFID and Cloud computing are widely used in the IoT (Internet of Things). However, there are few res...
In practical applications, the owner of an RFID-tagged item canchange. In this paper, we propose a n...
Radio frequency identification (RFID) is a modern approach to identify and track several assets at o...
Abstract: While a major of existing RFID security protocols address tag authentication issues, the a...
Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for I...
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifi...