PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Reassignment scheme of an RFID tag’s key for owner transfer
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Challenge-eesponse based RFID authentication protocol for distributed database environment
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
New security problem in RFID systems “tag killing”
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Reducing time complexity in RFID systems
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Algebraic Attacks on RFID Protocols
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Vulnerability analysis of RFID protocols for tag ownership transfer
Computer Networks: The International Journal of Computer and Telecommunications Networking
An agent based back-end RFID tag management system
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Scalable RFID security protocols supporting tag ownership transfer
Computer Communications
Secure and scalable RFID authentication protocol
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Practical RFID ownership transfer scheme
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Hi-index | 0.00 |
Radio Frequency Identification (RFID) has come under the spotlight as technology supporting ubiquitous society. But now, we face several security problems and challenges in RFID systems. Recent papers have reported that RFID systems have to achieve the following requirements: (1) Indistinguishability, (2) Forward Security, (3) Replay Attack resistance, (4) Tag Killing resistance, and (5) Ownership Transferability. We have to design RFID system that achieves the above-mentioned requirements. The previous security methods achieve only some of them individually, and no RFID system has been constructed that achieves all requirements. In this paper, we propose an RFID security method that achieves all requirements based on a hash function and a symmetric key cryptosystem. In addition, our proposed method provides not only high-security but also high-efficiency.