RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
Efficient authentication for low-cost RFID systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Efficient RFID authentication protocol for ubiquitous computing environment
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification
Computer Standards & Interfaces
Algebraic Attacks on RFID Protocols
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
An efficient authentication protocol for RFID systems resistant to active attacks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
New privacy results on synchronized RFID authentication protocols against tag tracing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Critical Evaluation of RFID Security Protocols
International Journal of Information Security and Privacy
Hi-index | 0.00 |
Radio Frequency Identification (RFID) system is an important technology in ubiquitous computing environment RFID system should be compatible with most RFID system applications to support the ubiquitous computing environment Recently, researchers had studied about RFID standardization After all, EPCglobal Class-1 Gen-2 (C1G2) RFID is selected as an international standard of RFID systems Unfortunately, it has fatal security problems to be vulnerable to information leakage and traceability since a tag of EPCglobal C1G2 emits its fixed ID(EPC) without hiding or modifying A main goal of our work is to propose the secure protocol well suitable for EPCglobal C1G2 First of all, our protocol exactly follows RFID standard with only current capabilities of a tag approved in the standard, assuring that our protocol is secure against impersonation, information leakage, and traceability etc.