SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Verifying Authentication Protocols in CSP
IEEE Transactions on Software Engineering
RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Some new attacks upon security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
On Unifying Some Cryptographic Protocol Logics
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Automated analysis of cryptographic protocols using Mur/spl phi/
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
Formal Correctness of Security Protocols (Information Security and Cryptography)
Formal Correctness of Security Protocols (Information Security and Cryptography)
Theoretical Computer Science - Automated reasoning for security protocol analysis
Universally composable and forward-secure RFID authentication and authenticated key exchange
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Unidirectional key distribution across time and space with applications to RFID security
SS'08 Proceedings of the 17th conference on Security symposium
Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP)
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
PUF-HB: a tamper-resilient HB based authentication protocol
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Efficient authentication for low-cost RFID systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Efficient RFID authentication protocol for ubiquitous computing environment
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
EMAP: an efficient mutual-authentication protocol for low-cost RFID tags
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Challenge-eesponse based RFID authentication protocol for distributed database environment
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
RFID privacy based on public-key cryptography
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Public key cryptography and RFID tags
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
A survey of security visualization for computer network logs
Security and Communication Networks
Security and Communication Networks
Hi-index | 0.00 |
Radio Frequency Identification Authentication Protocols (RFID APs) are an active research topic and many protocols have been proposed. In this paper, we consider a class of recently proposed lightweight RFID authentication protocols: CRAP, LCAP, OHLCAP, O-TRAP, YA-TRAP, and YA-TRAP+, which are claimed to be resistant to conventional attacks and suitable for low cost RFID device scenarios. We examine them using GNY logic to determine whether they can be proved to have achieved their protocol goals. We show that most of them meet their goals, though some do not. Furthermore this approach enables us to identify similarities and subtle differences among these protocols. Finally, we offer guidelines on when it is necessary to use encryption rather than hash functions in the design of RFID authentication protocols.