PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
RFID security without extensive cryptography
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Security and Privacy Issues in E-passports
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Secure Access Control Schemes for RFID Systems with Anonymity
MDM '06 Proceedings of the 7th International Conference on Mobile Data Management
HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks
SECPERU '06 Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Security analysis of a cryptographically-enabled RFID device
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Security of ultra-lightweight RFID authentication protocols and its improvements
ACM SIGOPS Operating Systems Review
M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Challenge-eesponse based RFID authentication protocol for distributed database environment
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Reducing time complexity in RFID systems
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol
Information Security Applications
A Lightweight Authentication Protocol for Low-Cost RFID
Journal of Signal Processing Systems
Weaknesses in a recent ultra-lightweight RFID authentication protocol
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
A RFID architecture framework for global supply chain applications
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Read / write performance for low memory passive HF RFID tag-reader system
Journal of Theoretical and Applied Electronic Commerce Research
Survivable RFID systems: issues, challenges, and techniques
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
International Journal of Internet Protocol Technology
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
A lightweight anti-desynchronization RFID authentication protocol
Information Systems Frontiers
Lightweight mutual authentication protocol for securing RFID applications
International Journal of Internet Technology and Secured Transactions
A survey on RFID security and provably secure grouping-proof protocols
International Journal of Internet Technology and Secured Transactions
Cryptanalysis of the David-Prasad RFID ultralightweight authentication protocol
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Strong authentication and strong integrity (SASI) is not that strong
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Tree-based RFID authentication protocols are definitively not privacy-friendly
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Improvement of the RFID authentication scheme based on quadratic residues
Computer Communications
Weaknesses in two recent lightweight RFID authentication protocols
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
A Study on Secure RFID Mutual Authentication Scheme
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Flaws on RFID grouping-proofs. Guidelines for future sound protocols
Journal of Network and Computer Applications
Securing low-cost RFID systems: An unconditionally secure approach
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Diffusing RFID-sensor networks and security threats
WSEAS Transactions on Signal Processing
Two RFID-based Solutions to Enhance Inpatient Medication Safety
Journal of Medical Systems
Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Privacy-friendly synchronized ultralightweight authentication protocols in the storm
Journal of Network and Computer Applications
EMAP: An efficient mutual authentication protocol for passive RFID tags
International Journal of Automation and Computing
Security threat mitigation trends in low-cost RFID systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Passive attack on RFID LMAP++ authentication protocol
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Server-less RFID authentication and searching protocol with enhanced security
International Journal of Communication Systems
Security analysis of an ultra-lightweight RFID authentication protocol—SLMAP*
Security and Communication Networks
Another fallen hash-based RFID authentication protocol
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
Concurrency and Computation: Practice & Experience
Desynchronization attack on RAPP ultralightweight authentication protocol
Information Processing Letters
Yet another ultralightweight authentication protocol that is broken
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
RFID security in the context of "internet of things"
Proceedings of the First International Conference on Security of Internet of Things
Hardware Cost Measurement of Lightweight Security Protocols
Wireless Personal Communications: An International Journal
Cryptanalysis of the RNTS system
The Journal of Supercomputing
RFID Authentication Protocol to Enhance Patient Medication Safety
Journal of Medical Systems
CRFID: An RFID system with a cloud database as a back-end server
Future Generation Computer Systems
Hardware implementation of tag-reader mutual authentication protocol for RFID systems
Integration, the VLSI Journal
On the security of RFID anti-counting security protocol (ACSP)
Journal of Computational and Applied Mathematics
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol
Journal of Computational and Applied Mathematics
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
Journal of Network and Computer Applications
Security analysis of LMAP using AVISPA
International Journal of Security and Networks
Hi-index | 0.00 |
As low-cost RFIDs become more and more popular, it is imperative to design ultra-lightweight RFID authentication protocols to resist all possible attacks and threats. However, all the previous ultra-lightweight authentication schemes are vulnerable to various attacks. In this paper, we propose a new ultra-lightweight RFID authentication protocol that provides strong authentication and strong integrity protection of its transmission and of updated data. The protocol requires only simple bit-wise operations on the tag and can resist all the possible attacks. These features make it very attractive to low-cost RFIDs and very low-cost RFIDs.