RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Recently, RFID (Radio Frequency IDentification) has been receiving a great deal of attention. RFID is a very simple technology that involves communication between a microchip called a RFID tag and an electronic reader. RFID systems can be used in a variety of applications. There are some security properties that RFID systems require, such as location privacy and replay-attack resistance. In order to satisfy these security properties, many authentication protocols have been proposed. In these security protocols, most of them are easily attacked by attackers because tags cannot perform high-cost computations due to their limited resources. In this paper, we propose an efficient authentication protocol called SKU (Symmetric Key Update), which can provide replay-attack resistance and location privacy in low-cost RFID systems.