{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:20:44Z","timestamp":1760242844825,"version":"build-2065373602"},"reference-count":39,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2016,12,29]],"date-time":"2016-12-29T00:00:00Z","timestamp":1482969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Spanish MINECO","award":["TEC2014-54110-R"],"award-info":[{"award-number":["TEC2014-54110-R"]}]},{"DOI":"10.13039\/501100000930","name":"NSF","doi-asserted-by":"publisher","award":["CNS 1347113","DUE 1241525","DGE 1538850","DGE 1565215"],"award-info":[{"award-number":["CNS 1347113","DUE 1241525","DGE 1538850","DGE 1565215"]}],"id":[{"id":"10.13039\/501100000930","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>RFID ownership transfer protocols (OTPs) transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs) is a challenge still unresolved. In this paper, we address this issue and show that it can be solved by using channels with positive secrecy capacity. We implement these channels with noisy tags and provide practical values, thus proving that perfect secrecy is theoretically possible. We then define a communication model that captures spatiotemporal events and describe a first example of symmetric-key based OTP that: (i) is formally secure in the proposed communication model and (ii) achieves privacy with a noisy tag wiretap channel without TTPs.<\/jats:p>","DOI":"10.3390\/s17010053","type":"journal-article","created":{"date-parts":[[2016,12,29]],"date-time":"2016-12-29T10:16:20Z","timestamp":1483006580000},"page":"53","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["RFID Ownership Transfer with Positive Secrecy Capacity Channels"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2795-312X","authenticated-orcid":false,"given":"Jorge","family":"Munilla","sequence":"first","affiliation":[{"name":"Escuela T\u00e9cnica Superior de Ingenieros de Telecomunicaci\u00f3n, Universidad de M\u00e1laga, M\u00e1laga 29071, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5094-5668","authenticated-orcid":false,"given":"Mike","family":"Burmester","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Florida State University, Tallahassee, FL 32306, USA"}]},{"given":"Alberto","family":"Peinado","sequence":"additional","affiliation":[{"name":"Escuela T\u00e9cnica Superior de Ingenieros de Telecomunicaci\u00f3n, Universidad de M\u00e1laga, M\u00e1laga 29071, Spain"}]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW 2522, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1562-5105","authenticated-orcid":false,"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[{"name":"School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW 2522, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2016,12,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Van Deursen, T., Mauw, S., Radomirovic, S., and Vullers, P. (2009). Secure Ownership and Ownership Transfer in RFID Systems, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-642-04444-1_39"},{"key":"ref_2","unstructured":"Avoine, G. (2005). Adversarial Model for Radio Frequency Identification, Security and Cryptography Laboratory (LASEC). Technical Report."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"7:1","DOI":"10.1145\/1609956.1609963","article-title":"Defining strong privacy for RFID","volume":"13","author":"Juels","year":"2009","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"ref_4","first-page":"68","article-title":"On privacy models for RFID","volume":"Volume 4833","author":"Kurosawa","year":"2007","journal-title":"ASIACRYPT"},{"key":"ref_5","first-page":"251","article-title":"RFID privacy models revisited","volume":"Volume 5283","author":"Jajodia","year":"2008","journal-title":"ESORICS"},{"key":"ref_6","unstructured":"Vullers, P. (2009). Secure Ownership and Ownership Transfer in RFID Systems. [Master\u2019s Thesis, Eindhoven University]."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1109\/TSMCC.2010.2091501","article-title":"Single RFID Tag Ownership Transfer Protocols","volume":"42","author":"Kapoor","year":"2012","journal-title":"IEEE Trans. Syst. Man Cybern. Part C"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1007\/978-3-540-74377-4_81","article-title":"An efficient and secure RFID security method with ownership transfer","volume":"Volume 4456","author":"Osaka","year":"2007","journal-title":"Computational Intelligence and Security"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.comcom.2014.08.015","article-title":"Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner privacy","volume":"55","author":"Sundaresan","year":"2015","journal-title":"Comput. Commun."},{"key":"ref_10","unstructured":"Song, B. (2008, January 9\u201311). RFID Tag Ownership Transfer. Proceedings of the Workshop on RFID Security\u2014RFIDSec\u201908, Budapest, Hungary."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Lei, H., and Cao, T. (2007). Proceedings of the First International Symposium on Data, Privacy, and E-Commerce, ISDPE \u201907, Chengdu, China, 1\u20133 November 2007, IEEE Computer Society Press.","DOI":"10.1109\/ISDPE.2007.139"},{"key":"ref_12","unstructured":"Gong, L., Needham, R., and Yahalom, R. (1990). Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, Oakland, CA, USA, 7\u20139 May 1990, IEEE Computer Society Press."},{"key":"ref_13","first-page":"240","article-title":"On a limitation of BAN logic","volume":"Volume 765","author":"Helleseth","year":"1994","journal-title":"Advances in Cryptology EUROCRYPT 93"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/382258.382789","article-title":"A critique of the Burrows, Abadi, and Needham logic","volume":"24","author":"Nessett","year":"1990","journal-title":"Oper. Syst. Rev."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","article-title":"Strand Spaces: Proving Security Protocols Correct","volume":"7","author":"Thayer","year":"1999","journal-title":"J. Comput. Secur."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Molnar, D., Soppera, A., and Wagner, D. (2005, January 11\u201312). A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. Proceedings of the Workshop on Selected Areas in Cryptography (SAC 2005), Kingston, ON, Canada.","DOI":"10.1007\/11693383_19"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"319","DOI":"10.3233\/JCS-2010-0409","article-title":"Practical RFID Ownership Transfer Scheme","volume":"19","author":"Ng","year":"2011","journal-title":"J. Comput. Secur."},{"key":"ref_18","first-page":"1303","article-title":"Reassignment Scheme of an RFID Tag\u2019s Key for Owner Transfer","volume":"Volume 3823","author":"Enokido","year":"2005","journal-title":"EUC Workshops"},{"key":"ref_19","unstructured":"Avoine, G., Dysli, E., and Oechslin, P. (2005, January 11\u201312). Reducing time complexity in RFID systems. Proceedings of the 12th International Conference on Selected Areas in Cryptography (SAC 2005), Kingston, ON, Canada."},{"key":"ref_20","unstructured":"Soppera, A., and Burbridge, T. (2006, January 12\u201314). Secure by default: The RFID acceptor tag (RAT). Proceedings of the Workshop on RFID Security\u2014RFIDSec\u201906, Graz, Austria."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Osaka, K., Takagi, T., Yamazaki, K., and Takahashi, O. (2006, January 3\u20136). An efficient and secure RFID security method with ownership transfer. Proceedings of the 2006 International Conference on Computational Intelligence and Security, Guangzhou, China.","DOI":"10.1109\/ICCIAS.2006.295430"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Chen, H.-B., Lee, W.-B., Zhao, Y.-H., and Chen, Y.-L. (2009, January 15\u201316). Enhancement of the RFID security method with ownership transfer. Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC \u201909, Suwon, Korea.","DOI":"10.1145\/1516241.1516284"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Jappinen, P., and Hamalainen, H. (2008, January 13\u201317). Enhanced RFID security method with ownership transfer. Proceedings of the 2008 International Conference on Computational Intelligence and Security, CIS \u201908, Suzhou, China.","DOI":"10.1109\/CIS.2008.26"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Yoon, E.-J., and Yoo, K.-Y. (2008, January 18\u201321). Two security problems of RFID security method with ownership transfer. Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing, NPC 2008, Shanghai, China.","DOI":"10.1109\/NPC.2008.64"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1109\/LCOMM.2010.03.092058","article-title":"Vulnerabilities in some recently proposed RFID ownership transfer protocols","volume":"14","author":"Kapoor","year":"2010","journal-title":"IEEE Commun. Lett."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Dimitriou, T. (2008, January 22\u201325). RFIDdot: RFID delegation and ownership transfer made simple. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey.","DOI":"10.1145\/1460877.1460921"},{"key":"ref_27","unstructured":"Elkhiyaoui, K., Blass, E.-O., and Molva, R. (2011, January 26\u201328). Rotiv: RFID ownership transfer with issuer verification. Proceedings of the 7th International Conference on RFID Security and Privacy, RFIDSec\u201911, Amherst, MA, USA."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1016\/j.comcom.2010.02.027","article-title":"Scalable {RFID} security protocols supporting tag ownership transfer","volume":"34","author":"Song","year":"2011","journal-title":"Comput. Commun."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1016\/j.dss.2011.08.002","article-title":"Multi-tag and Multi-owner RFID Ownership Transfer in Supply Chains","volume":"52","author":"Kapoor","year":"2011","journal-title":"Decis. Support Syst."},{"key":"ref_30","unstructured":"EPC Global EPC Tag Data Standards, vs. 1.3. Available online: http:\/\/www.epcglobalinc.org\/standards\/EPCglobal_Tag_Data_Standard_TDS_Version_1.3.pdf."},{"key":"ref_31","first-page":"41","article-title":"RFID ownership transfer authorization systems conforming epcglobal class-1 generation-2 standards","volume":"13","author":"Chen","year":"2011","journal-title":"Int. J. Netw. Secur."},{"key":"ref_32","unstructured":"Koralalage, K.H.S.S., Reza, S.M., Miura, J., Goto, Y., and Cheng, J. (2007, January 11\u201315). POP method: An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism. Proceedings of the 2007 ACM Symposium on Applied Computing, SAC \u201907, Seoul, Korea."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s11235-013-9711-4","article-title":"A secure ownership transfer protocol using epcglobal gen-2 RFID","volume":"53","author":"Chen","year":"2013","journal-title":"Telecommun. Syst."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.comcom.2016.05.007","article-title":"Attacks on Ownership Transfer Scheme for Multi-tag Multi-owner Passive RFID Environments","volume":"88","author":"Munilla","year":"2016","journal-title":"Comput. Commun."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Paret, D. (2005). RFID and Contactless Smart Card Applications, John Wiley & Sons.","DOI":"10.1002\/9780470016152"},{"key":"ref_36","unstructured":"International Organization for Standardization (2012). ISO\/IEC 29192-1: Information Technology\u2014Security Techniques\u2014Lightweight Cryptography\u2014Part 1: General, ISO."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The Wire-Tap Channel","volume":"54","author":"Wyner","year":"1975","journal-title":"Bell Syst. Tech. J."},{"key":"ref_38","unstructured":"Atluri, V. (2003). Proceedings of the Conference on Computer and Communications Security, Washington, DC, USA, 27\u200330 October 2003, ACM Press."},{"key":"ref_39","first-page":"289","article-title":"Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags","volume":"Volume 3928","author":"Posegga","year":"2006","journal-title":"Proceedings of the International Conference on Smart Card Research and Advanced Applications\u2014CARDIS, Tarragona, Spain, 19\u201321 April 2006"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/1\/53\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:29:31Z","timestamp":1760210971000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/1\/53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,29]]},"references-count":39,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2017,1]]}},"alternative-id":["s17010053"],"URL":"https:\/\/doi.org\/10.3390\/s17010053","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2016,12,29]]}}}