Security Parallels between People and Pervasive Devices
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
HB-MP: A further step in the HB-family of lightweight authentication protocols
Computer Networks: The International Journal of Computer and Telecommunications Networking
Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Security analysis of a cryptographically-enabled RFID device
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Public-Key Cryptography for RFID-Tags
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Security of ultra-lightweight RFID authentication protocols and its improvements
ACM SIGOPS Operating Systems Review
IEEE Transactions on Dependable and Secure Computing
PRESENT: An Ultra-Lightweight Block Cipher
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
A Practical Attack on the MIFARE Classic
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification
Computer Standards & Interfaces
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
An efficient authentication protocol for RFID systems resistant to active attacks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
The security of EPC Gen2 compliant RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
New applications of t-functions in block ciphers and hash functions
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
EMAP: an efficient mutual-authentication protocol for low-cost RFID tags
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
Cryptanalysis of the David-Prasad RFID ultralightweight authentication protocol
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Strong authentication and strong integrity (SASI) is not that strong
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Tree-based RFID authentication protocols are definitively not privacy-friendly
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Weaknesses in two recent lightweight RFID authentication protocols
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Passive attack on RFID LMAP++ authentication protocol
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety
Journal of Medical Systems
Minimalist security and privacy schemes based on enhanced AES for integrated WISP sensor networks
International Journal of Communication Networks and Distributed Systems
Security analysis of LMAP using AVISPA
International Journal of Security and Networks
Hi-index | 0.00 |
The design of ultralightweight authentication protocols that conform to low-cost tag requirements is imperative. This paper analyses the most important proposals (except for those based in hard problems such as the HB [1-3] family) in the area [4-6] and identifies the common weaknesses that have left all of them open to various attacks [7-11]. Finally, we present Gossamer, a new protocol inspired by the recently published SASI scheme [13], that was lately also the subject of a disclosure attack by Hernandez-Castro et al.[14]. Specifically, this new protocol is designed to avoid the problems of the past, and we examine in some deep its security and performance.