Handbook of Applied Cryptography
Handbook of Applied Cryptography
Relations Among Notions of Security for Public-Key Encryption Schemes
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Soft blocking: flexible blocker tags on the cheap
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
Some methods for privacy in RFID communication
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Soft blocking: flexible blocker tags on the cheap
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
RFID privacy issues and technical challenges
Communications of the ACM - Special issue: RFID
A new two-message authentication protocol for RFID sensor networks
MPAC '05 Proceedings of the 3rd international workshop on Middleware for pervasive and ad-hoc computing
RFID security without extensive cryptography
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
The Evolution of RFID Security
IEEE Pervasive Computing
Protecting RFID communications in supply chains
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Universally composable and forward-secure RFID authentication and authenticated key exchange
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A platform for RFID security and privacy administration
LISA '06 Proceedings of the 20th conference on Large Installation System Administration
Covert channels in privacy-preserving identification systems
Proceedings of the 14th ACM conference on Computer and communications security
An anti-counterfeiting RFID privacy protection protocol
Journal of Computer Science and Technology
Managing RFID data in supply chains
International Journal of Internet Protocol Technology
RFID tags: privacy and security aspects
International Journal of Mobile Communications
Robust, anonymous RFID authentication with constant key-lookup
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Low-Cost Authentication Protocol of the RFID System Using Partial ID
Computational Intelligence and Security
Security and Privacy on Authentication Protocol for Low-Cost RFID
Computational Intelligence and Security
RFID System Security Using Identity-Based Cryptography
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
International Journal of Applied Cryptography
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
An Efficient Authentication Protocol for Low-Cost RFID Systems
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
rfid in pervasive computing: State-of-the-art and outlook
Pervasive and Mobile Computing
Secure RFID authentication scheme for EPC class Gen2
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
RFID-driven global supply chain and management
International Journal of Computer Applications in Technology
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol
Information Security Applications
A hybrid approach for privacy-preserving RFID tags
Computer Standards & Interfaces
Securing RFID Systems by Detecting Tag Cloning
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
A Highly Scalable RFID Authentication Protocol
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
Computer Standards & Interfaces
Defining strong privacy for RFID
ACM Transactions on Information and System Security (TISSEC)
Secure EPC Gen2 Compliant Radio Frequency Identification
ADHOC-NOW '09 Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks
Short survey: Taxonomy and survey of RFID anti-collision protocols
Computer Communications
Securing wireless implantable devices for healthcare: ideas and challenges
IEEE Communications Magazine
Evaluation of the simple mutual authentication protocol for ISO/IEC 14443 smart cards
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
A server centric authentication protocol for a RFID system
CASE'09 Proceedings of the fifth annual IEEE international conference on Automation science and engineering
Anonymizer-Enabled Security and Privacy for RFID
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
An improved lightweight RFID protocol using substring
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Looking at a class of RFID APs through GNY logic
International Journal of Security and Networks
RFID survivability quantification and attack modeling
Proceedings of the third ACM conference on Wireless network security
Secure communication for RFIDs proactive information security within computational security
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
Efficient implementation of pseudorandom functions for electronic seal protection protocols
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Passive attacks on a class of authentication protocols for RFID
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Efficient RFID authentication protocol for minimizing RFID tag computation
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
ALGSICS: combining physics and cryptography to enhance security and privacy in RFID systems
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
The security of EPC Gen2 compliant RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Mutual authentication scheme for EPC tags- readers in the supply chain
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Mutual authentication protocol for RFID tags based on synchronized secret information with monitor
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Keep on blockin' in the free world: personal access control for low-cost RFID tags
Proceedings of the 13th international conference on Security protocols
SEAS: a secure and efficient anonymity scheme for low-cost RFID tags
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Anti-collision protocol for RFID-sensor network and the security threats
ACMOS'10 Proceedings of the 12th WSEAS international conference on Automatic control, modelling & simulation
MAMECTIS'10 Proceedings of the 12th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems
Physical-layer identification of RFID devices
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Physical-layer identification of UHF RFID tags
Proceedings of the sixteenth annual international conference on Mobile computing and networking
WSEAS TRANSACTIONS on COMMUNICATIONS
Lightweight privacy preserving authentication for RFID using a stream cipher
FSE'10 Proceedings of the 17th international conference on Fast software encryption
A desynchronization tolerant RFID private authentication protocol
WASA'10 Proceedings of the 5th international conference on Wireless algorithms, systems, and applications
Secure and private search protocols for RFID systems
Information Systems Frontiers
Classifying RFID attacks and defenses
Information Systems Frontiers
Improvement of the RFID authentication scheme based on quadratic residues
Computer Communications
Diffusing RFID-sensor networks and security threats
WSEAS Transactions on Signal Processing
Two RFID-based Solutions to Enhance Inpatient Medication Safety
Journal of Medical Systems
On two RFID privacy notions and their relations
ACM Transactions on Information and System Security (TISSEC)
Lightweight RFID mutual authentication protocol against feasible problems
ICICS'11 Proceedings of the 13th international conference on Information and communications security
RFID systems: a survey on security threats and proposed solutions
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Low-Cost cryptography for privacy in RFID systems
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
RFID guardian: a battery-powered mobile device for RFID privacy management
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A scalable and untraceable authentication protocol for RFID
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Security problems of systems of extremely weak devices
Annales UMCS, Informatica - Security Systems
EMAP: an efficient mutual-authentication protocol for low-cost RFID tags
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Shoehorning security into the EPC tag standard
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Privacy for public transportation
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
New security problem in RFID systems “tag killing”
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Security threat mitigation trends in low-cost RFID systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
High-Power proxies for enhancing RFID privacy and utility
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Reducing time complexity in RFID systems
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
An automatic, time-based, secure pairing protocol for passive RFID
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
EPCBC: a block cipher suitable for electronic product code encryption
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Passive attack on RFID LMAP++ authentication protocol
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
A pre-computable signature scheme with efficient verification for RFID
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Survivability Enhancing Techniques for RFID Systems
International Journal of Handheld Computing Research
Critical Evaluation of RFID Security Protocols
International Journal of Information Security and Privacy
Randomized skip lists-based private authentication for large-scale RFID systems
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing
Security analysis of LMAP using AVISPA
International Journal of Security and Networks
Hi-index | 0.00 |
A radio-frequency identification (RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query from a nearby reader. The price of these tags promises to drop to the range of $0.05 per unit in the next several years, offering a viable and powerful replacement for barcodes. The challenge in providing security for low-cost RFID tags is that they are computationally weak devices, unable to perform even basic symmetric-key cryptographic operations. Security researchers often therefore assume that good privacy protection in RFID tags is unattainable. In this paper, we explore a notion of minimalist cryptography suitable for RFID tags. We consider the type of security obtainable in RFID devices with a small amount of rewritable memory, but very limited computing capability. Our aim is to show that standard cryptography is not necessary as a starting point for improving security of very weak RFID devices. Our contribution is twofold: We propose a new security model for authentication and privacy in RFID tags. This model takes into account the natural computational limitations and the likely attack scenarios for RFID tags in real-world settings. It represents a useful divergence from standard cryptographic security modeling, and thus a new basis for practical formalization of minimal security requirements for low-cost RFID-tag security. We describe a protocol that provably achieves the properties of authentication and privacy in RFID tags in our proposed model, and in a good practical sense. It involves no computationally intensive cryptographic operations, and relatively little storage.