scispace - formally typeset
Proceedings ArticleDOI

RFID authentication protocol for low-cost tags

TLDR
This paper proposes a new authentication protocol which provides the identified privacy and security features and is also efficient and shows that it requires less tag-side storage and computation than other similarly structured RFID protocols.
Abstract
In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy and security features and is also efficient. The new protocol resists tag information leakage, tag location tracking, replay attacks, denial of service attacks, backward traceability, forward traceability (under an assumption), and server impersonation (also under an assumption). We also show that it requires less tag-side storage and computation than other similarly structured RFID protocols.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Scalable RFID security protocols supporting tag ownership transfer

TL;DR: A novel scalable RFID authentication protocol based on the scheme presented in Song and Mitchell (2009) [1], that takes constant time to authenticate a tag is proposed.
Journal ArticleDOI

Securing RFID systems conforming to EPC Class 1 Generation 2 standard

TL;DR: This paper will give demonstrations on what have caused weaknesses in the mutual authentication protocol for RFID, and more of that, an improved protocol is also proposed which are free from worries of the problems mentioned above.
Posted Content

Attacks on RFID Protocols

TL;DR: This document consists of a description of attack methodologies and a collection of detailed attacks upon RFID protocols to serve as a quick and easy reference and it will be updated as new attacks are found.
Proceedings ArticleDOI

RFID security in the context of "internet of things"

TL;DR: A recently proposed protocol's strengths and weaknesses are discussed and then an improved protocol is proposed, retaining efficiency of the protocol intact, for solving identification issues of objects around us in a cost effective manner.
Proceedings ArticleDOI

Attacks and improvements to an RIFD mutual authentication protocol and its extensions

TL;DR: The vulnerabilities of the RFID mutual authentication protocol and the ownership transfer protocol are analyzed and revisions are proposed to eliminate the vulnerabilities with comparable storage and computational requirements.
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Book

Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification

TL;DR: In this paper, the authors provide a standard reference for people working with RFID technology, including electron data carrier architecture and common algorithms for anticollision, and a detailed appendix providing up-to-date information on relevant ISO standards and regulations, including descriptions of ISO 14443 for contactless ticketing and ISO 15693 covering the smartlabel.
Book ChapterDOI

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

TL;DR: Privacy and security risks and how they apply to the unique setting of low-cost RFID devices are described and several security mech- anisms are proposed and suggested areas for future research are suggested.
Book

Discrete Mathematics and Its Applications

TL;DR: This text is designed for the sophomore/junior level introduction to discrete mathematics taken by students preparing for future coursework in areas such as math, computer science and engineering.
Proceedings ArticleDOI

Privacy and security in library RFID: issues, practices, and architectures

TL;DR: Privacy issues related to Radio Frequency Identification in libraries are exposed, current deployments are described, and a simple scheme is given that provides security against a passive eavesdropper using XOR alone, without pseudo-random functions or other heavy crypto operations.
Related Papers (5)