Proceedings of the International Conference on Cryptography: Policy and Algorithms
RFID authentication protocol for low-cost tags
WiSec '08 Proceedings of the first ACM conference on Wireless network security
The state of RFID for effective baggage tracking in the airline industry
International Journal of Mobile Communications
RFID in retail: a framework for examining consumers' ethical perceptions
International Journal of Mobile Communications
A novel mutual authentication scheme based on quadratic residues for RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Robust and efficient authenticated key agreement in mobile communications
International Journal of Mobile Communications
TK-AKA: using temporary key on authentication and key agreement protocol on UMTS
International Journal of Network Management
Defining strong privacy for RFID
ACM Transactions on Information and System Security (TISSEC)
Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags
IEEE Communications Letters
DoS-resistant ID-based password authentication scheme using smart cards
Journal of Systems and Software
An Online RFID Laboratory Learning Environment
IEEE Transactions on Learning Technologies
Enhanced monitoring of tuberculosis patients by using RFID technologies
International Journal of Mobile Communications
A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Mutual authentication protocol for RFID tags based on synchronized secret information with monitor
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Improvement of the RFID authentication scheme based on quadratic residues
Computer Communications
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Efficient authentication for low-cost RFID systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
An effective AKA protocol for UMTS
International Journal of Mobile Communications
An improved authentication protocol for mobile agent device in RFID environment
International Journal of Mobile Communications
Development of an E-Healthcare Information Security Risk Assessment Method
Journal of Database Management
Hi-index | 0.00 |
Radio Frequency Identification (RFID) system can be read by radio wave within several metres without having direct contact. Many research focus on improving security and privacy problem. Recently, Rizomiliotis et al. point out that Song-Mitchell protocol is vulnerable to the denial of service attack, since the attacker can easily modify the data to make the server and the tag out of synchronisation without detection. However, this paper pointed out that Rizomiliotis et al.'s modification was not correct. Therefore, we designed a new authentication scheme, which inherits the advantage of Song-Mitchell protocol and Rizomiliotis et al.'s protocol, along with the assumption that the insecure channel exists between the reader and the server. Finally, this paper provides a security analysis to comparison with other protocols.