scispace - formally typeset
Journal ArticleDOI

RFID mutual authentication protocols

Selwyn Piramuthu
- Vol. 50, Iss: 2, pp 387-393
TLDR
This work considers a stream of publications among these that consider mutual authentication of tag and reader, and identifies some existing vulnerabilities.
Abstract
As RFID-tagged systems become ubiquitous, the acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past six years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. We consider a stream of publications among these that consider mutual authentication of tag and reader, and identify some existing vulnerabilities.

read more

Citations
More filters
Journal ArticleDOI

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment

TL;DR: This paper has put forwarded an RFID-based authentication architecture for distributed IoT (Internet of Things) applications suitable for the future smart city environments and designed for IoT-based infrastructure in smart city environment.
Journal ArticleDOI

A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system

TL;DR: This article proposes a realistic lightweight authentication protocol for RFID system, which can ensure various imperative security properties such as anonymity of the RFID tag, untraceability, forward security etc.
Journal ArticleDOI

Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography

TL;DR: This article presents an improved realistic and lightweight authentication protocol to ensure protection against known attacks and outperforms the competing protocols in terms of security.
Journal ArticleDOI

A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications

TL;DR: This work proposes a novel and lightweight RFID authentication scheme with cloud for e-healthcare applications that not only resists the common attacks, but also keeps mutual authentication, information integrity, forward untraceability and backwardUntraceability.
Journal ArticleDOI

Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks

TL;DR: This work provides an overview of existing literature on addressing relay attacks through ambient condition measurements and proposes an elliptic curve-based mutual authentication protocol that addresses relay attacks based on the surface temperature of the prover as measured by prover and verifier and measured single-bit round-trip times.
References
More filters

Cryptographic Approach to “Privacy-Friendly” Tags

TL;DR: This paper discusses and clarifies the requirements and restrictions of RFID systems, and suggests the use of the previously proposed scheme, which protects user privacy using a low-cost hash chain mechanism.
Journal ArticleDOI

Secure and Serverless RFID Authentication and Search Protocols

TL;DR: A more flexible authentication protocol that provides comparable protection without the need for a central database is proposed and a protocol for secure search for RFID tags is suggested.
Proceedings Article

Mutual Authentication Protocol for Low-cost RFID

TL;DR: I am grateful to Prof. Adi Shamir of the Weizmann Institute in Israel for his precious comments and kind advice on the authors' protocol during his visit to ICU during Asiacryt2004.
Journal ArticleDOI

Identifying RFID-embedded objects in pervasive healthcare applications

TL;DR: This work considers Radio Frequency Identification (RFID) tags, which are increasingly being used in pervasive healthcare applications, and proposes and illustrates several algorithms for locating and identifying the presence of a tag in such systems.
Journal ArticleDOI

Protocols for RFID tag/reader authentication

TL;DR: This work studies and evaluates a few protocols from each of those streams approaching the RFID tag/reader privacy/security problem from different perspectives, identifies possible vulnerabilities, and provides alternate solutions when possible.
Related Papers (5)