REFERENCES
Bagheri, N., Aghili, S. F., and Safkhani, M. (2018). On the
security of two ownership transfer protocols and their
improvements. Int. Arab J. Inf. Technol., 15(1):87–93.
Basin, D., Cremers, C., Dreier, J., and Sasse, R. (2017).
Symbolically Analyzing Security Protocols using
Tamarin. ACM SIGLOG News.
Burmester, M., de Medeiros, B., and Motta, R. (2008).
Provably secure grouping-proofs for rfid tags. In Gri-
maud, G. and Standaert, F.-X., editors, Smart Card
Research and Advanced Applications, pages 176–190,
Berlin, Heidelberg. Springer Berlin Heidelberg.
Cao, T., Chen, X., Doss, R., Zhai, J., Wise, L. J., and Zhao,
Q. (2016). Rfid ownership transfer protocol based on
cloud. Computer Networks, 105:47 – 59.
D
˜
Aaz, M., Mart
˜
An, C., and Rubio, B. (2016). State-of-
the-art, challenges, and open issues in the integration
of internet of things and cloud computing. Journal of
Network and Computer Applications, 67:99 – 117.
Dolev, D. and Yao, A. C. (1981). On the security of pub-
lic key protocols. In Proceedings of the 22Nd An-
nual Symposium on Foundations of Computer Sci-
ence, SFCS ’81, pages 350–357, Washington, DC,
USA. IEEE Computer Society.
Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A.,
and Uhsadel, L. (2007). A survey of lightweight-
cryptography implementations. IEEE Design Test of
Computers, 24(6):522–533.
Eronen, P., Nir, Y., Hoffman, P. E., and Kaufman, C. (2010).
Internet Key Exchange Protocol Version 2 (IKEv2).
RFC 5996.
Fielding, R. (2000). Representational state transfer. Ar-
chitectural Styles and the Design of Netowork-based
Software Architecture, pages 76–85.
He, L., Gan, Y., and Yin, Y. (2014). Secure group ownership
transfer protocol with independence of old owner for
rfid tags. Computer modelling and new technologies,
18(12B):209 – 214.
Inc., E. (2008). Epc radio-frequency identity protocols
class-1 generation-2 uhf rfid protocol for communica-
tions at 860 mhz – 960 mhz. Report 1.2.0, EPCglobal
Inc.
Kapoor, G. and Piramuthu, S. (2008). Protocols for objects
with multiple rfid tags. In 2008 16th International
Conference on Advanced Computing and Communi-
cations, pages 208–213.
Kapoor, G., Zhou, W., and Piramuthu, S. (2011). Multi-
tag and multi-owner rfid ownership transfer in supply
chains. Decision Support Systems, 52(1):258–270.
Khan, M. S. N., Marchal, S., Buchegger, S., and Asokan,
N. (2019). chownIoT: Enhancing IoT Privacy by Au-
tomated Handling of Ownership Change, pages 205–
221. Springer International Publishing, Cham.
Lanza, J., Sotres, P., S
´
anchez, L., Galache, J. A., Santana,
J. R., Guti
´
errez, V., and Mu
˜
noz, L. (2016). Manag-
ing large amounts of data generated by a smart city
internet of things deployment. Int. J. Semant. Web Inf.
Syst., 12(4):22–42.
Oded, G. (2009). Foundations of Cryptography: Volume 2,
Basic Applications. Cambridge University Press, New
York, NY, USA, 1st edition.
Pradeep, B. H. and Singh, S. (2013). Ownership authenti-
cation transfer protocol for ubiquitous computing de-
vices. In 2013 International Conference on Computer
Communication and Informatics, pages 1–6.
Rescorla, E. and Modadugu, N. (2012). Datagram Trans-
port Layer Security Version 1.2. RFC 6347.
Roman, R., Najera, P., and Lopez, J. (2011). Securing the
internet of things. Computer, 44(9):51–58.
Saied, Y. B. and Olivereau, A. (2012). D-hip: A distributed
key exchange scheme for hip-based internet of things.
In 2012 IEEE International Symposium on a World
of Wireless, Mobile and Multimedia Networks (WoW-
MoM), pages 1–7.
Saito, J., Imamoto, K., and Sakurai, K. (2005). Reassign-
ment scheme of an rfid tag’s key for owner transfer.
In International Conference on Embedded and Ubiq-
uitous Computing, pages 1303–1312. Springer.
Schaad, J. (2017). Cbor object signing and encryption
(cose). RFC 8152, RFC Editor.
Sundaresan, S., Doss, R., Zhou, W., and Piramuthu, S.
(2015). Secure ownership transfer for multi-tag
multi-owner passive rfid environment with individual-
owner-privacy. Computer Communications, 55:112 –
124.
Tam, P. and Newmarch, J. (2004). Protocol for ownership
of physical objects in ubiquitous computing environ-
ments. In IADIS international conference E-Society,
volume 2004, pages 614–621.
Taqieddin, E., Al-Dahoud, H., Niu, H., and Sarangapani,
J. (2018). Tag ownership transfer in radio frequency
identification systems: A survey of existing protocols
and open challenges. IEEE Access.
Texas Instruments, I. (2015). Cc2538 powerful wire-
less microcontroller system-on-chip for 2.4-ghz ieee
802.15. 4, 6lowpan, and zigbee applications. CC2538
datasheet (April 2015).
Tschofenig, H. (2016). and t. fossati,” transport layer
security (tls)/datagram transport layer security (dtls)
profiles for the internet of things. Technical re-
port, RFC 7925, DOI 10.17487/RFC7925, July 2016,¡
http://www. rfc-editor. org/info . . . .
V
¨
ogler, M., Schleicher, J. M., Inzinger, C., and Dustdar, S.
(2016). A scalable framework for provisioning large-
scale iot deployments. ACM Trans. Internet Technol.,
16(2):11:1–11:20.
Zhou, W., Yoon, E. J., and Piramuthu, S. (2012). Simul-
taneous multi-level rfid tag ownership & transfer in
health care environments. Decision Support Systems,
54(1):98–108.
Zuo, Y. (2010). Changing hands together: a secure group
ownership transfer protocol for rfid tags. In System
Sciences (HICSS), 2010 43rd Hawaii International
Conference on, pages 1–10. IEEE.
ICISSP 2020 - 6th International Conference on Information Systems Security and Privacy
44