Open AccessPosted Content
Attacks on RFID Protocols
Ton van Deursen,Saša Radomirović +1 more
Reads0
Chats0
TLDR
This document consists of a description of attack methodologies and a collection of detailed attacks upon RFID protocols to serve as a quick and easy reference and it will be updated as new attacks are found.Abstract:
This document consists of a description of attack methodologies and a collection of detailed attacks upon RFID protocols. It is meant to serve as a quick and easy reference and it will be updated as new attacks are found. Currently the only attacks on protocols shown in full detail are the authors’ original attacks with references to similar attacks on other protocols. The main security properties considered are authentication, untraceability, and desynchronization resistance.read more
Citations
More filters
Journal ArticleDOI
A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
Yi-Pin Liao,Chih-Ming Hsiao +1 more
TL;DR: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol that can achieve mutual authentication and satisfy the essential requirements of RFID system is proposed.
Journal ArticleDOI
Scalable RFID security protocols supporting tag ownership transfer
Boyeon Song,Chris J. Mitchell +1 more
TL;DR: A novel scalable RFID authentication protocol based on the scheme presented in Song and Mitchell (2009) [1], that takes constant time to authenticate a tag is proposed.
Proceedings ArticleDOI
Low-cost untraceable authentication protocols for RFID
TL;DR: This paper addresses the risk of tracking attacks in RFID networks by repairing three revised EC-RAC protocols and presenting the search protocol, a novel scheme which allows for privately querying a particular tag, and proof its security properties.
Journal ArticleDOI
Flaws on RFID grouping-proofs. Guidelines for future sound protocols
TL;DR: This paper reviews the literature published in this research topic and shows the security flaws of the proposed protocols, named RFID grouping-proofs generally and presents a yoking-proof for low-cost RFID tags, named Kazahaya, that conforms to the proposed guidelines.
Journal ArticleDOI
An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud
TL;DR: The proposed RFID-enabled authentication scheme for healthcare applications in VCC environment is found to be secure with respect to mutual authentication of servers and tags, replay attack, tracking attack, users anonymity, eavesdropping, and cloning with forward secrecy.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
On the security of public key protocols
Danny Dolev,Andrew Chi-Chih Yao +1 more
TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Book ChapterDOI
Authenticating pervasive devices with human protocols
Ari Juels,Stephen A. Weis +1 more
TL;DR: This paper analyzes a particular human-to-computer authentication protocol designed by Hopper and Blum (HB), and shows it to be practical for low-cost pervasive devices, and proves the security of the HB+ protocol against active adversaries based on the hardness of the Learning Parity with Noise (LPN) problem.
Proceedings ArticleDOI
A hierarchy of authentication specifications
TL;DR: It is suggested that the appropriate authentication requirement will depend upon the use to which the protocol is put, and the model checker FDR can be used to test whether a system running the protocol meets such a specification.
Proceedings ArticleDOI
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
D. Henrici,P. Muller +1 more
TL;DR: This work introduces a simple scheme relying on one way hash-functions that greatly enhances location privacy by changing traceable identifiers on every read getting by with only a single, unreliable message exchange.