991 resultados para Tag ownership transfer


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we propose a novel secure tag ownership transfer scheme for closed loop RFID systems. An important property of our method is that the ownership transfer is guaranteed to be atomic and the scheme is protected against desynchronisation leading to permanent DoS. Further, it is suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as they only use the CRC and PRNG functions that passive RFID tags are capable of. We provide a detailed security analysis to show that our scheme satisfies the required security properties of tag anonymity, tag location privacy, forward secrecy, forward untraceability while being resistant to replay, desynchronisation and server impersonation attacks. Performance comparisons show that our scheme is practical and can be implemented on passive low-cost RFID tags.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we propose a novel approach to secure ownership transfer in RFID systems based on the quadratic residue property. We present two secure ownership transfer schemes-the closed loop and open loop schemes. An important property of our schemes is that ownership transfer is guaranteed to be atomic. Further, both our schemes are suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as they only use operations that such passive RFID tags are capable of. We provide a detailed security analysis to show that our schemes achieve strong privacy and satisfy the required security properties of tag anonymity, tag location privacy, forward secrecy, and forward untraceability. We also show that the schemes are resistant to replay (both passive and algebraic), desynchronization, and server impersonation attacks. Performance comparisons demonstrate that our schemes are practical and can be implemented on low-cost passive RFID tags.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the RFID system a tag is attached to an object which might own by a number of people during its life cycle. As a result, the RFID system requires to transfer ownership of the tag. The ownership transfer has to protect privacy of current and new owner. There are number of ownership transfer protocol proposed to achieve secure ownership transfer. However, most of them are impractical or insecure to implement on current passive RFID tags. We are presenting an ownership transfer protocol using timer based shared secret for closed loop RFID systems. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In RFID system a tag is attached to an object which might own by a number of owners during its life time. This requires the RFID system to transfer ownership of the tag to its new owner. The ownership transfer has to protect privacy of current and new owner. Many ownership tag ownership transfer exists in the literature, however, most of them are impractical or insecure to implement on current passive RFID tags. We are proposing a timer based ownership transfer protocol for closed loop RFID systems. The proposal in this paper includes two implement scenario to cover diverse tags type. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Existing business models require RFID tag to transfer its ownership during its life cycle. As a result, a RFID tags might have many owners during its life cycle. However, the transfer of ownership should ensure that previous owners have no information about current owner's data. Physical ownership does not ensure digital ownership transfer given the wireless nature of communication with RFID tags. Most of the proposed protocol in this nature is implacable to address aU existing RFID tag ownership transfer scenarios. Moreover, they have many security concerns and vulnerabilities. In this paper, we have investigated and discussed all existing business cases and their transfer scenarios. To cover all ownership transfer scenarios, we have presented an ownership transfer protocol. The proposed protocol has used modified DiffieHellman algorithm to perform ownership request validation and authentication of involved parties. Performance comparison shows that our protocol is practical to implement passive low-cost RFID tags, securely performs tag ownership transfer and can be used for all existing ownership transfer scenarios.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag and multi-owner RFID environment. Most of the existing work in this area do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since they use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill this gap by proposing a protocol based on simple XOR and 128-bit Pseudo Random Number Generators (PRNG), operations that can be easily implemented on low-cost passive RFID tags. The protocol thus achieves EPC C1G2 compliance while meeting the security requirements. Also, our protocol provides additional protection using a blind-factor to prevent tracking attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner RFID environment that provides individual-owner-privacy. To our knowledge, the existing schemes do not provide individual-owner-privacy and most of the existing schemes do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since the protocols use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill these gaps by proposing a protocol that provides individual-owner-privacy, based on simple XOR and 128-bit pseudo-random number generators (PRNG), operations that are easily implemented on low-cost RFID tags while meeting the necessary security requirements thus making it a viable option for large scale implementations. Our protocol also provides additional protection by hiding the pseudo-random numbers during all transmissions using a blind-factor to prevent tracking attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

RFID and Cloud computing are widely used in the IoT (Internet of Things). However, there are few research works which combine RFID ownership transfer schemes with Cloud computing. Subsequently, this paper points out the weaknesses in two protocols proposed by Xie et al. (2013) [3] and Doss et al. (2013) [9]. To solve the security issues of these protocols, we present a provably secure RFID ownership transfer protocol which achieves the security and privacy requirements for cloud-based applications. To be more specific, the communication channels among the tags, mobile readers and the cloud database are insecure. Besides, an encrypted hash table is used in the cloud database. Next, the presented protocol not only meets backward untraceability and the proposed strong forward untraceability, but also resists against replay attacks, tracing attacks, inner reader malicious impersonation attacks, tag impersonation attacks and desynchronization attacks. The comparisons of security and performance properties show that the proposed protocol has more security, higher efficiency and better scalability compared with other schemes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The objective of the research is to develop security protocols for EPC C1G2 RFID Passive Tags in the areas of ownership transfer and grouping proof.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The most natural mode of family firm succession is the intergenerational ownership transfer. Statistical evidence, however, suggests that in most cases the succession process fails. There can be several reasons as a lot of personal, emotional and structural factors can act as an inhibitor to succession. The effectiveness of the implementation of any succession strategy is strongly dependent on the efficiency of intergenerational knowledge transfer, which is related to the parties’ absorptive capacity and willingness to learn. The paper is based on the experiences learned from the INSIST project. In the framework of the project different aspects of family business succession have been investigated in three participating countries (Hungary, Poland and the United Kingdom). The aim of the paper is to identify the patterns of management, succession, knowledge transfer and learning in family businesses. Issues will be examined in detail such as the succession strategies of companies investigated and the efforts family businesses and their managers make in order to harmonize family goals (such as emotional stability, harmony, and reputation) with business- related objectives (e.g. survival, growth or profitability).

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Big business in Russia: The pace of ownership transfer in the Russian economy has speeded up considerably over the last year. There has been a significant rise in the number of acquisitions of whole enterprises, and large blocks of shares in individual firms and plants. Similarly the number of mergers, bankruptcies and take-overs of failing firms by their strongest competitors has grown. The Russian power industry: This study is an overview of the current condition and principles on which the Russian power sector has been functioning so far. This analysis has been carried out against the background of the changes that have been taking place in the sector since the beginning of the 1990s. This text also contains a description of guidelines and progress made so far in implementing the reform of the Russian power industry, the draft of which was adopted by the government of the Russian Federation in summer 2001. However, the purpose of this study is not an economic analysis of the draft, but an attempt to present the political conditions and possible consequences of the transformations carried out in the Russian power sector. The final part attempts to evaluate the possibilities and threats related to the implementation of the reform in its present shape. Ukrainian metallurgy: The metallurgic sector, like the east-west transit of energy raw materials, is a strategic source of revenue for Ukraine. Over the last ten years, this sector has become Kiev's most important source of foreign currency inflows, accounting for over 40 per cent of its total export revenues. The growth of metallurgic production, which has continued almost without interruption since the mid-1990s, has contributed considerably to the increase in GDP which Ukraine showed in 2000, for the first time in its independent history.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This book provides a comparative analysis of the emerging corporate control structures in the transition economies. It details characteristics of corporate governance in the two largest transition economies: Russia and Poland. It explores what kind of ownership structures are emerging in these two countries and to what degree they are they path-dependent and conditional on the initial choice of privatisation methods - fast ownership transfer through the mass privatisation programme and loans-for-equity scheme in Russia, and a more 'organic' growth of the new private sector in Poland. It examines the directions of the subsequent, post-privatisation, secondary ownership flows in both countries and the impact of the government on corporations, implied both by the residual shareholding of the state and by its regulatory and administrative actions.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The recent purchase of Scotia Sanctuary, in western New South Wales, by the Australian Wildlife Conservancy (AWC), with significant funding from the Commonwealth government raises questions about the National Reserve System in Australia. The property had been placed on the market by the financially strapped Earth Sanctuaries Ltd (ESL). The Commonwealth's involvement represents an important landmark in private land conservation. This commentary investigates some of the possible policy implications this intervention may have for the National Reserve System as a whole and, in particular, about the role of private land within this System.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The current study of Scandinavian multinational corporate subsidiaries in the rapidly growing Eastern European market, due to their particular organizational structure, attempts to gain some new insights into processes and potential benefits of knowledge and technology transfer. This study explores how to succeed in knowledge transfer and to become more competitive, driven by the need to improve transfer of systematic knowledge for the manufacture of product and service provisions in newly entered market. The scope of current research is exactly limited to multinational corporations, which are defined as enterprises comprising entities in two or more countries, regardless of legal forms and field of activity of those entities, and which operate under a system of decision-making permitting coherent policies and a common strategy through one or more decision-making centers. The entities are linked, by ownership, and able to exercise influence over the activities of the others; and, in particular, to share the knowledge, resources, and responsibilities with others. The research question is "How and to which extent can knowledge-transfer influence a company's technological competence and economic competitiveness?" and try to find out what particular forces and factors affect the development of subsidiary competencies; what factors influence the corporate integration and use of the subsidiary's competencies; and what may increase competitiveness of MNC pursuing leading position in entered market. The empirical part of the research was based on qualitative analyses of twenty interviews conducted among employees in Scandinavian MNC subsidiary units situated in Ukraine, using structured sequence of questions with open-ended answers. The data was investigated by comparison case analyses to literature framework. Findings indicate that a technological competence developed in one subsidiary will lead to an integration of that competence with other corporate units within the MNC. Success increasingly depends upon people's learning. The local economic area is crucial for understanding competition and industrial performance, as there seems to be a clear link between the performance of subsidiaries and the conditions prevailing in their environment. The linkage between competitive advantage and company's success is mutually dependent. Observation suggests that companies can be characterized as clusters of complementary activities such as R&D, administration, marketing, manufacturing and distribution. Study identifies barriers and obstacles in technology and knowledge transfer that is relevant for the subsidiaries' competence development. The accumulated experience can be implemented in new entered market with simple procedures, and at a low cost under specific circumstances, by cloning. The main goal is focused to support company prosperity, making more profits and sustaining an increased market share by improved product quality and/or reduced production cost of the subsidiaries through cloning approach. Keywords: multinational corporation; technology transfer; knowledge transfer; subsidiary competence; barriers and obstacles; competitive advantage; Eastern European market