The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Efficient authentication for low-cost RFID systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Challenge-eesponse based RFID authentication protocol for distributed database environment
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
A New Formal Proof Model for RFID Location Privacy
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
RFID mutual authentication protocols
Decision Support Systems
Scalability and Security Conflict for RFID Authentication Protocols
Wireless Personal Communications: An International Journal
Improving the efficiency of RFID authentication with pre-computation
AISC '12 Proceedings of the Tenth Australasian Information Security Conference - Volume 125
Unbalanced states violates RFID privacy
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
Despite various solutions to the security problems in an RFID system, most are unable to fully support all the security requirements. Plus, when designing a viable RFID system, account should also be taken of the computational load on the back-end database and restricted capacity of a tag. Accordingly, an efficient RFID protocol is proposed to reduce the computational load on both the back-end data-base and the tags, while also guaranteeing most security requirements for RFID wireless communication, including untraceability, authentication, and robustness against replay and spoofing attacks. Plus, in the case of desynchronization resulting from communication failure or malicious attack, the proposed scheme can recover synchronization between the database and the tag.