RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID: Applications, Security, and Privacy
RFID: Applications, Security, and Privacy
Embedded and Ubiquitous Computing - EUC 2005 Workshops: EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 8-9, 2005 (Lecture ... Science) (Lecture Notes in Computer Science)
Anti-counterfeit ownership transfer protocol for low cost RFID system
WSEAS Transactions on Computers
RFID protocol evaluation using Bayesian networks
ACMOS'09 Proceedings of the 11th WSEAS international conference on Automatic control, modelling and simulation
Hi-index | 0.00 |
The RFID market in Europe is growing. It is expected that in 2007 the market exceeds 2.5 billions USD. Unfortunately, despite of benefits of the technology some problems remaining. One of them is security. Many different attacks have been described in theory and tested practically, but it is difficult to find the perfect secure solution for a wireless unit that has limited computing abilities because of cost constraints. On the way to find the suitable solution, this paper describes different attack types and analyses the ability of two proposed authentication protocols to resist these attacks.