PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
RFID security without extensive cryptography
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
A Framework for Seamless Information Retrieval between an EPC Network and a Mobile RFID Network
CIT '06 Proceedings of the Sixth IEEE International Conference on Computer and Information Technology
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Challenge-eesponse based RFID authentication protocol for distributed database environment
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Multi-tag and multi-owner RFID ownership transfer in supply chains
Decision Support Systems
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
A survey of security visualization for computer network logs
Security and Communication Networks
Security and Communication Networks
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
Authentication and search mechanism for diffusing RFID-sensor networks
International Journal of Sensor Networks
Security analysis of LMAP using AVISPA
International Journal of Security and Networks
Hi-index | 0.00 |
Current RFID authentication schemes are not suitable for use in a mobile RFID environment since the proposed authentication schemes result in a computing load because of the low-cost tag and provide insufficient protection to the information and to the privacy of the user. Therefore, we propose a lightweight authentication protocol for mobile RFID networks that complies with Electronic Product Code (EPC) Class-1 Gen-2 norms, effectively achieving forward security. We use the GNY logic analysis to show what the proposed authentication protocol can do against threats of replay attacks, spoofing, Man-In-The-Middle (MITM), counterfeit tag and message loss.