The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Efficient RFID authentication protocol for ubiquitous computing environment
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
A New Formal Proof Model for RFID Location Privacy
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Hi-index | 0.00 |
Previous RFID techniques cause serious privacy infringements such as excessive information exposure and user's location information tracking due to the wireless characteristics and the limitation of RFID systems. Especially the information security problem of read only tag has been solved by physical method. In this paper, we propose a low-cost mutual authentication protocol which can be adapted to read-only tag using XOR computation and Partial ID concept. The proposed protocol is secure against reply attacking, eavesdropping, spoofing attacking and location tracking, therefore it can be used to support secure and low cost RFID system.