Characteristics of scalability and their impact on performance
Proceedings of the 2nd international workshop on Software and performance
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
RFID security without extensive cryptography
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
Universally composable and forward-secure RFID authentication and authenticated key exchange
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
RFID authentication protocol for low-cost tags
WiSec '08 Proceedings of the first ACM conference on Wireless network security
An Efficient and Secure RFID Security Method with Ownership Transfer
Computational Intelligence and Security
Server Impersonation Attacks on RFID Protocols
UBICOMM '08 Proceedings of the 2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
International Journal of Applied Cryptography
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
Proceedings of the second ACM conference on Wireless network security
Security in RFID and Sensor Networks
Security in RFID and Sensor Networks
Scalable RFID Pseudonym Protocol
NSS '09 Proceedings of the 2009 Third International Conference on Network and System Security
A family of dunces: trivial RFID identification and authentication protocols
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Traceable privacy of recent provably-secure RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
RFID traceability: a multilayer problem
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Journal of Network and Computer Applications
Multi-tag and multi-owner RFID ownership transfer in supply chains
Decision Support Systems
Security flaws in a recent RFID delegation protocol
Personal and Ubiquitous Computing
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Addressing flaws in RFID authentication protocols
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Secure architecure for the integration of RFID and sensors in personal networks
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Security and Privacy Analysis of Song---Mitchell RFID Authentication Protocol
Wireless Personal Communications: An International Journal
Privacy-preserving billing for e-ticketing systems in public transportation
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Authentication and search mechanism for diffusing RFID-sensor networks
International Journal of Sensor Networks
Tree-LSHB+: An LPN-Based Lightweight Mutual Authentication RFID Protocol
Wireless Personal Communications: An International Journal
Unbalanced states violates RFID privacy
Journal of Intelligent Manufacturing
Hi-index | 0.24 |
We identify privacy, security and performance requirements for radio frequency identification (RFID) protocols, as well as additional functional requirements such as tag ownership transfer. Many previously proposed protocols suffer from scalability issues because they require a linear search to identify or authenticate a tag. In support of scalability, some RFID protocols, however, only require constant time for tag identification, but, unfortunately, all previously proposed schemes of this type have serious shortcomings. We propose a novel scalable RFID authentication protocol based on the scheme presented in Song and Mitchell (2009) [1], that takes constant time to authenticate a tag. We also propose secret update protocols for tag ownership and authorisation transfer. The proposed protocols possess the identified privacy, security and performance properties and meet the requirements for secure ownership transfer identified here.