{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T02:56:28Z","timestamp":1720925788942},"reference-count":29,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2014,2,19]],"date-time":"2014-02-19T00:00:00Z","timestamp":1392768000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2014,5]]},"abstract":"ABSTRACT<\/jats:title>This paper addresses radio frequency identification (RFID) authentication and ownership transfer in offline scenarios. Four typical related works are reviewed in detail. A series of shortcomings and vulnerabilities of them are pointed out. A new RFID authentication protocol based on a novel tag\u2010owner\u2010assisting architecture is proposed, making a tag's owner an essential participant of the RFID authentication process. The proposed protocol is distinguished from existing works in providing ownership transfer, access control, and mutual authentication without any centralized database neither on a backend server nor in a reader. The security of the proposed protocol is verified by using automated validation of Internet security protocols and applications tool. The proposed protocol is server\u2010less, simple, scalable, untraceable, and device\u2010independent. These features are simultaneously achieved in a single RFID authentication protocol for the first time. Copyright \u00a9 2014 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.965","type":"journal-article","created":{"date-parts":[[2014,2,20]],"date-time":"2014-02-20T07:44:20Z","timestamp":1392882260000},"page":"934-944","source":"Crossref","is-referenced-by-count":5,"title":["TOA: a tag\u2010owner\u2010assisting RFID authentication protocol toward access control and ownership transfer"],"prefix":"10.1002","volume":"7","author":[{"given":"Wei","family":"Xie","sequence":"first","affiliation":[{"name":"School of Electronic Science and Engineering National University of Defense Technology Changsha China"}]},{"given":"Lei","family":"Xie","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology Nanjing University Nanjing China"}]},{"given":"Chen","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronic Science and Engineering National University of Defense Technology Changsha China"}]},{"given":"Qiang","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Communication and Computer Science Swiss Federal Institute of Technology Lausanne Lausanne Switzerland"}]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[{"name":"Software Center Institute of Chinese Electronic Equipment System Engineering Corporation Beijing China"}]},{"given":"Chaojing","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Electronic Science and Engineering National University of Defense Technology Changsha China"}]}],"member":"311","published-online":{"date-parts":[[2014,2,19]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.120"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.260"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.347"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.339"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.300"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.709"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.04.004"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77090-9_5"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2008.10.022"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.06.006"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.5755\/j01.itc.41.3.860"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.09.008"},{"key":"e_1_2_7_14_1","unstructured":"TanCC ShengB LiQ.Serverless search and authentication protocols for RFID \u201c in5th Annual IEEE International Conference on Pervasive Computing and Communications PerCom 2007 March 19 2007 \u2010 March 23 2007 White Plains NY United states 2007;3\u201312."},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.061012"},{"key":"e_1_2_7_16_1","doi-asserted-by":"crossref","unstructured":"AhamedSI HoqueE RahmanF KawsarF NakajimaT.YA\u2010SRAP: yet another serverless RFID authentication protocol in4th International Conference on Intelligent Environments IE 08 July 21 2008 \u2010 July 22 2008 Seattle WA United states 2008.","DOI":"10.1049\/cp:20081141"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-009-9786-0"},{"key":"e_1_2_7_18_1","doi-asserted-by":"crossref","unstructured":"LinI\u2010C TsaurS\u2010C ChangK\u2010P.Lightweight and serverless RFID authentication and search protocol in2009 International Conference on Computer and Electrical Engineering ICCEE 2009 December 28 2009 \u2010 December 30 2009 Dubai United arab emirates 2009;95\u201399.","DOI":"10.1109\/ICCEE.2009.159"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1246"},{"key":"e_1_2_7_20_1","doi-asserted-by":"crossref","unstructured":"YinX LiW.LPO: a RFID authentication protocol for low\u2010cost tags without back\u2010end database in2012 International Conference on Computer Distributed Control and Intelligent Environmental Monitoring CDCIEM 2012 March 5 2012 \u2010 March 6 2012 Zhangjiajie Hunan China 2012;393\u2013396.","DOI":"10.1109\/CDCIEM.2012.100"},{"key":"e_1_2_7_21_1","doi-asserted-by":"crossref","unstructured":"Al\u2010ZewairiM AlqatawnaJF Al\u2010KadiO.Privacy and security for RFID access control systems: RFID access control systems without back\u2010end database in2011 1st IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies AEECT 2011 December 6 2011 \u2010 December 8 2011 Amman Jordan 2011 pp. University of Jordan; Princess Sumaya University for Technology; IEEE \u2010 Region 8.","DOI":"10.1109\/AEECT.2011.6132520"},{"key":"e_1_2_7_22_1","doi-asserted-by":"crossref","unstructured":"MolnarD SopperaA WagnerD.A scalable delegatable pseudonym protocol enabling ownership transfer of RFID tags (extended abstract) inSelected Areas in Cryptography. vol. 3897 B. Preneel and S. Tavares Eds. ed 2006:276\u2013290.","DOI":"10.1007\/11693383_19"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.08.002"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.027"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2091501"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2012.01.004"},{"key":"e_1_2_7_27_1","doi-asserted-by":"crossref","unstructured":"SyamsuddinI DillonT ChangE HanS.A survey of RFID authentication protocols based on hash\u2010chain method in3rd International Conference on Convergence and Hybrid Information Technology ICCIT 2008 November 11 2008 \u2010 November 13 2008 Busan Korea Republic of 2008;559\u2013564.","DOI":"10.1109\/ICCIT.2008.314"},{"key":"e_1_2_7_28_1","doi-asserted-by":"crossref","unstructured":"GuoJ PeyrinT PoschmannA.The PHOTON family of lightweight hash functions \u201c in31st Annual International Cryptology Conference CRYPTO 2011 August 14 2011 \u2010 August 18 2011 Santa Barbara CA United states 2011;222\u2013239.","DOI":"10.1007\/978-3-642-22792-9_13"},{"key":"e_1_2_7_29_1","doi-asserted-by":"crossref","unstructured":"ArmandoA BasinD BoichutY et al.The AVISPA tool for the automated validation of Internet security protocols and applications inproceedings of CAV 2005 Computer Aided Verification LNCS 3576 Springer Verlag","DOI":"10.1007\/11513988_27"},{"key":"e_1_2_7_30_1","unstructured":"vonOheimbD.The high\u2010level protocol specification language HLPSL developed in the EU project AVISPA inProceedings of APPSEM 2005 Workshop 2005."}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.965","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T09:25:35Z","timestamp":1696497935000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.965"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,19]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,5]]}},"alternative-id":["10.1002\/sec.965"],"URL":"https:\/\/doi.org\/10.1002\/sec.965","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,19]]}}}