PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
On Existence Proofs for Multiple RFID Tags
PERSER '06 Proceedings of the 2006 ACS/IEEE International Conference on Pervasive Services
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Radio frequency identification (RFID) is a technology for automated identification, which consists of a reading device, a server and RFID tags. We are interested in authentication protocols where two tags are simultaneously scanned by an RFID reader. Although there are several authentication protocols proposed in literature, some of them are insecure. This paper analyses the security of the authentication protocols based on two possible attacks: the brute-force attack against the proof and the forgery attack by using an authorised reader interacting with RFID tags. We also evaluate these protocols in terms of computation costs, communication costs and the resources used by adversary to run the attack (e.g., the size of memories and the number of queries). The results from our analysis indicate that our proposed protocol is more secure than the others and provides a countermeasure against forgery attack.