The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
Security analysis of a cryptographically-enabled RFID device
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
A large scale implementation of RFID technology in many practical applications including supply chain and retail stores require the resolution of the either-or dichotomy between low-cost RFID tags and secure RFID systems. This research proposes an approach in which the complexity and hence the cost of RFID tags can be drastically reduce by eliminating the security-assuring computational resources from the RFID tags and placing the security burden on the data processing server. This approach can make it possible to carry out secure transactions even with simple and inexpensive RFID tags. This research investigates a multiple ID authentication protocol based on this approach. The paper presents an empirical formula for the prediction of the performance of the protocol in terms of the number of spoofs per transaction for a given protocol configuration.