DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
An extension of a hierarchical reinforcement learning algorithm for multiagent settings
EWRL'11 Proceedings of the 9th European conference on Recent Advances in Reinforcement Learning
On the security of RFID anti-counting security protocol (ACSP)
Journal of Computational and Applied Mathematics
Hi-index | 0.00 |
As the radio frequency identification (RFID) technology continues to evolve and mature, RFID tags can be implemented in a wide range of applications. Due to the shared wireless medium between the RFID reader and the RFID tag, however, adversaries can launch various attacks on the RFID system. The privacy and security issues of RFID are getting more and more important. To thwart different types of attacks, we propose a novel Anonymous RFID Authentication Protocol, termed ARAP, which can accomplish the authentication without disclosing real IDs of the participating tags and provide strong privacy and security protection of the RFID users. ARAP offers the anonymity of tags in addition to tag unlocatability and untrackability. It is also resistant to a wide range of attacks. Compared with the previous researches, the major advantages of ARAP are that ARAP can withstand physical attack, de-synchronization attack, disclosure attack and cloning attack, and also can provide anonymity and mutual authentication. We believe that our protocol is attractive to RFID applications.