Survivable RFID systems: issues, challenges, and techniques
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Strong authentication and strong integrity (SASI) is not that strong
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Tree-based RFID authentication protocols are definitively not privacy-friendly
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Privacy-friendly synchronized ultralightweight authentication protocols in the storm
Journal of Network and Computer Applications
Journal of Medical Systems
RFID security in the context of "internet of things"
Proceedings of the First International Conference on Security of Internet of Things
CRFID: An RFID system with a cloud database as a back-end server
Future Generation Computer Systems
Hi-index | 0.00 |
Security issues become more and more significant in RFID development. Recently, Chien proposed an ultralightweight RFID authentication protocol in order to achieve privacy and authenticity with limited computation and transmission resources. However, we find two desynchronization attacks to break the protocol. In order to repair the protocol, two patches that slightly modify the protocol are presented in the paper.