LFSR-based Hashing and Authentication
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
An Approach to Security and Privacy of RFID System for Supply Chain
CEC-EAST '04 Proceedings of the E-Commerce Technology for Dynamic E-Business, IEEE International Conference
A Feasible Security Mechanism for Low Cost RFID Tags
ICMB '05 Proceedings of the International Conference on Mobile Business
A Lightweight Mutual Authentication Protocol for RFID Networks
ICEBE '05 Proceedings of the IEEE International Conference on e-Business Engineering
Protecting RFID communications in supply chains
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Mutual authentication in RFID: security and privacy
Proceedings of the 2008 ACM symposium on Information, computer and communications security
A novel mutual authentication scheme based on quadratic residues for RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure rural supply chain management using low cost paper watermarking
Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions
Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework
EUC '08 Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02
An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Anonymous mutual authentication protocol for RFID tag without back-end database
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
EMAP: an efficient mutual-authentication protocol for low-cost RFID tags
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Hi-index | 0.00 |
We present a privacy-preserving mutual authentication scheme for RFID. The scheme is compatible with supply chains originating at multiple manufactures, and is based on decentralized local databases connected to RFID readers. RFID tag capabilities are compliant with EPG Class 1 Generation 2: tags perform only random number generation, crypto CRC and XOR operations and do not store any global secrets. The scheme with some proposed extensions provides protection against fake tags, fake readers, replay, man-in-themiddle, compromise of reader or tag, cloning, and desynchronization attacks.