RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
IEEE Transactions on Dependable and Secure Computing
Probabilistic privacy leakage from challenge-response RFID authentication protocols
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
A novel mutual authentication scheme based on quadratic residues for RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
An Efficient and Secure RFID Security Method with Ownership Transfer
Computational Intelligence and Security
LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification
Computer Standards & Interfaces
A New Formal Proof Model for RFID Location Privacy
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
An Efficient Authentication and Key Agreement Protocol in RFID System
NPC '08 Proceedings of the IFIP International Conference on Network and Parallel Computing
Efficient RFID authentication protocols based on pseudorandom sequence generators
Designs, Codes and Cryptography
Enhancement of the RFID security method with ownership transfer
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Journal of Parallel and Distributed Computing
Lightweight authentication protocol for mobile RFID networks
International Journal of Security and Networks
A secure and efficient authentication protocol for passive RFID tags
ISWCS'09 Proceedings of the 6th international conference on Symposium on Wireless Communication Systems
Looking at a class of RFID APs through GNY logic
International Journal of Security and Networks
LRMAP: lightweight and resynchronous mutual authentication protocol for RFID system
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP)
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
An efficient mutual authentication protocol on RFID tags
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
An efficient authentication protocol for RFID systems resistant to active attacks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Low-cost and strong-security RFID authentication protocol
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Efficient RFID authentication protocol for minimizing RFID tag computation
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems
Journal of Network and Computer Applications
Scalability and Security Conflict for RFID Authentication Protocols
Wireless Personal Communications: An International Journal
An attack on an RFID authentication protocol conforming to EPC class 1 generation 2 standard
ICHIT'11 Proceedings of the 5th international conference on Convergence and hybrid information technology
RFID system with fairness within the framework of security and privacy
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Efficient RFID authentication protocol for ubiquitous computing environment
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A scalable and untraceable authentication protocol for RFID
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Vulnerability of an RFID authentication protocol proposed in at secubiq 2005
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
An RFID system based MCLT system with improved privacy
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Privacy-friendly synchronized ultralightweight authentication protocols in the storm
Journal of Network and Computer Applications
Self re-encryption protocol providing strong privacy for low cost RFID system
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
A case against currently used hash functions in RFID protocols
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Security flaws in a recent RFID delegation protocol
Personal and Ubiquitous Computing
New security problem in RFID systems “tag killing”
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Reducing time complexity in RFID systems
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Information confinement, privacy, and security in RFID systems
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
An improved anti-collision algorithm for ISO15693 RFID systems
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Unbalanced states violates RFID privacy
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
Recently, RFID system is a main technology to realize ubiquitous computing environments, but the feature of the RFID system may bring about various privacy problems. So, many kinds of protocols to resolve these problems have been researched. In this paper, we analyze the privacy problems of the previous protocols and propose more secure and effective authentication protocol to protect user's privacy. Then we analyze the security and effectiveness of the proposed protocol comparing with the previous protocols. The proposed protocol is based on Challenge-Response using one-way hash function and random number. The proposed protocol is secure against the replay the attack, spoofing attack and so on. In addition, the proposed protocol is fitted for distributed database environment.