Secure Human Identification Protocols
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks
SECPERU '06 Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing
HB-MP: A further step in the HB-family of lightweight authentication protocols
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hash Functions and RFID Tags: Mind the Gap
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Security Risks Associated with Radio Frequency Identification in Medical Environments
Journal of Medical Systems
Hi-index | 0.00 |
Radio Frequency Identification (RFID) systems are becoming more popular today because of the wide area of applications. It is being used in several industries such as the transport industry, sports, medical and government institutions. Its advantages such as the capacity to store more information than other identification technologies as well as the ease with which data can be read (since it doesn't require line of sight and human intervention), have sparked its widespread use and implementation in the various industries. The most widely used class of RFID tags is the class 1 tag because it offers identification functionality at low cost. Class 1 tags have limited computational power and memory resources. Due to these limitations, common authentication protocols such as AES cannot be implemented on the class 1 tags. As these tags provide essential implementation capabilities for development countries such as South Africa, it is vital that researchers focus on providing adequate security solutions. Taking into account the information security needs and performance limitations of the class 1 tags, we present a lightweight protocol based on the Hopper and Blum's human authentication protocol.