Handbook of Applied Cryptography
Handbook of Applied Cryptography
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
RFID security without extensive cryptography
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
A compact FPGA implementation of the hash function whirlpool
Proceedings of the 2006 ACM/SIGDA 14th international symposium on Field programmable gate arrays
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Reducing time complexity in RFID systems
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Information confinement, privacy, and security in RFID systems
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Security co-existence of wireless sensor networks and RFID for pervasive computing
Computer Communications
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
Proceedings of the second ACM conference on Wireless network security
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Algebraic Attacks on RFID Protocols
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Security of RFID Protocols -- A Case Study
Electronic Notes in Theoretical Computer Science (ENTCS)
Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags
IEEE Communications Letters
Improving Automatic Verification of Security Protocols with XOR
ICFEM '09 Proceedings of the 11th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
Anonymizer-Enabled Security and Privacy for RFID
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
A secure and scalable identification for hash-based RFID systems using updatable pre-computation
Proceedings of the third ACM conference on Wireless network security
Using RFID tags to improve pilgrimage management
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Vulnerability analysis of RFID protocols for tag ownership transfer
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure RFID authentication with efficient key-lookup
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Secure ownership and ownership transfer in RFID systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Securing RFID systems conforming to EPC Class 1 Generation 2 standard
Expert Systems with Applications: An International Journal
A secure RFID ticket system for public transport
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
Secure and private search protocols for RFID systems
Information Systems Frontiers
A lightweight anti-desynchronization RFID authentication protocol
Information Systems Frontiers
Scalable RFID security protocols supporting tag ownership transfer
Computer Communications
Secure and scalable RFID authentication protocol
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Securing low-cost RFID systems: An unconditionally secure approach
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
An authentication protocol for low-cost RFID tags
International Journal of Mobile Communications
Security Problems in an RFID System
Wireless Personal Communications: An International Journal
Scalability and Security Conflict for RFID Authentication Protocols
Wireless Personal Communications: An International Journal
Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Security analysis of two recently proposed RFID authentication protocols
Frontiers of Computer Science in China
Expert Systems with Applications: An International Journal
Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes
Wireless Personal Communications: An International Journal
Extending an RFID security and privacy model by considering forward untraceability
STM'10 Proceedings of the 6th international conference on Security and trust management
Security flaws in a recent RFID delegation protocol
Personal and Ubiquitous Computing
A secure distance-based RFID identification protocol with an off-line back-end database
Personal and Ubiquitous Computing
Lightweight authentication for RFID used in VANETs
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part II
Addressing flaws in RFID authentication protocols
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Simulation of anti-relay attack schemes for RFID ETC system
Proceedings of the 15th Communications and Networking Simulation Symposium
A new framework for privacy of RFID path authentication
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Context-aware web services for security control and privacy preservation in an RFID supply chain
International Journal of Information Technology and Management
Critical Evaluation of RFID Security Protocols
International Journal of Information Security and Privacy
Security and Privacy Analysis of Song---Mitchell RFID Authentication Protocol
Wireless Personal Communications: An International Journal
RFID security in the context of "internet of things"
Proceedings of the First International Conference on Security of Internet of Things
RFID Authentication Protocol to Enhance Patient Medication Safety
Journal of Medical Systems
CRFID: An RFID system with a cloud database as a back-end server
Future Generation Computer Systems
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
Journal of Network and Computer Applications
Security analysis of LMAP using AVISPA
International Journal of Security and Networks
Unbalanced states violates RFID privacy
Journal of Intelligent Manufacturing
Hi-index | 0.01 |
In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy and security features and is also efficient. The new protocol resists tag information leakage, tag location tracking, replay attacks, denial of service attacks, backward traceability, forward traceability (under an assumption), and server impersonation (also under an assumption). We also show that it requires less tag-side storage and computation than other similarly structured RFID protocols.