Protocols for RFID tag/reader authentication
Decision Support Systems
Enhancement of the Mutual Authentication protocol on RFID Passive Tags
IIH-MSP '07 Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 01
Challenge-eesponse based RFID authentication protocol for distributed database environment
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
New security problem in RFID systems “tag killing”
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Reducing time complexity in RFID systems
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Across-authority lightweight ownership transfer protocol
Electronic Commerce Research and Applications
Multi-tag and multi-owner RFID ownership transfer in supply chains
Decision Support Systems
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Protocol for ownership transfer across authorities: with the ability to assign transfer target
Security and Communication Networks
Secure multiple group ownership transfer protocol for mobile RFID
Electronic Commerce Research and Applications
Hi-index | 0.00 |
Radio frequency identification (RFID) is one popular technology being deployed for a variety of applications. Privacy and security issues play major roles in the success of RFID applications due to ease with masquerade, eavesdropping, etc. over the insecure channel between the tag and the reader. These security requirements are summarized: indistinguishability, forward security, ownership transfer, and resistance to replay attack and tag killing. Much research has been proposed. Except Osaka et al.'s scheme, none can meet all requirements. However, this paper introduces a new type of DoS attack which is ignored in these research studies to endanger their securities. As Osaka et al.'s scheme is superior to the others in terms of the functionalities, we take it as an example to show the possibility of the new DoS attack. A remedy is further provided to enhance the security to make the scheme more practical.