Proceedings ArticleDOI
RFID authentication protocol for low-cost tags
Boyeon Song,Chris J. Mitchell +1 more
- pp 140-147
TLDR
This paper proposes a new authentication protocol which provides the identified privacy and security features and is also efficient and shows that it requires less tag-side storage and computation than other similarly structured RFID protocols.Abstract:
In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy and security features and is also efficient. The new protocol resists tag information leakage, tag location tracking, replay attacks, denial of service attacks, backward traceability, forward traceability (under an assumption), and server impersonation (also under an assumption). We also show that it requires less tag-side storage and computation than other similarly structured RFID protocols.read more
Citations
More filters
Journal ArticleDOI
Scalable RFID security protocols supporting tag ownership transfer
Boyeon Song,Chris J. Mitchell +1 more
TL;DR: A novel scalable RFID authentication protocol based on the scheme presented in Song and Mitchell (2009) [1], that takes constant time to authenticate a tag is proposed.
Journal ArticleDOI
Securing RFID systems conforming to EPC Class 1 Generation 2 standard
TL;DR: This paper will give demonstrations on what have caused weaknesses in the mutual authentication protocol for RFID, and more of that, an improved protocol is also proposed which are free from worries of the problems mentioned above.
Posted Content
Attacks on RFID Protocols
Ton van Deursen,Saša Radomirović +1 more
TL;DR: This document consists of a description of attack methodologies and a collection of detailed attacks upon RFID protocols to serve as a quick and easy reference and it will be updated as new attacks are found.
Proceedings ArticleDOI
RFID security in the context of "internet of things"
Renu Aggarwal,Manik Lal Das +1 more
TL;DR: A recently proposed protocol's strengths and weaknesses are discussed and then an improved protocol is proposed, retaining efficiency of the protocol intact, for solving identification issues of objects around us in a cost effective manner.
Proceedings ArticleDOI
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
TL;DR: The vulnerabilities of the RFID mutual authentication protocol and the ownership transfer protocol are analyzed and revisions are proposed to eliminate the vulnerabilities with comparable storage and computational requirements.
References
More filters
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Book
Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
TL;DR: In this paper, the authors provide a standard reference for people working with RFID technology, including electron data carrier architecture and common algorithms for anticollision, and a detailed appendix providing up-to-date information on relevant ISO standards and regulations, including descriptions of ISO 14443 for contactless ticketing and ISO 15693 covering the smartlabel.
Book ChapterDOI
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
TL;DR: Privacy and security risks and how they apply to the unique setting of low-cost RFID devices are described and several security mech- anisms are proposed and suggested areas for future research are suggested.
Book
Discrete Mathematics and Its Applications
TL;DR: This text is designed for the sophomore/junior level introduction to discrete mathematics taken by students preparing for future coursework in areas such as math, computer science and engineering.
Proceedings ArticleDOI
Privacy and security in library RFID: issues, practices, and architectures
David Molnar,David Wagner +1 more
TL;DR: Privacy issues related to Radio Frequency Identification in libraries are exposed, current deployments are described, and a simple scheme is given that provides security against a passive eavesdropper using XOR alone, without pseudo-random functions or other heavy crypto operations.
Related Papers (5)
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Hung-Yu Chien,Che-Hao Chen +1 more