Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
IEEE Transactions on Dependable and Secure Computing
Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards
Computer Standards & Interfaces
A hybrid approach for privacy-preserving RFID tags
Computer Standards & Interfaces
PAP: A privacy and authentication protocol for passive RFID tags
Computer Communications
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags
IEEE Communications Letters
An overview of RFID tags and new cryptographic developments
Information Security Tech. Report
A Symmetric Key Based RFID Authentication Protocol Using Encrypted Tag ID
DASC '09 Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
Authentication and access control in RFID based logistics-customs clearance service platform
International Journal of Automation and Computing
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Radio frequency identification (RFID) system is a contactless automatic identification system, which uses small and low cost RFID tags. The primary problem of current security and privacy preserving schemes is that, in order to identify only one single tag, these schemes require a linear computational complexity on the server side. We propose an efficient mutual authentication protocol for passive RFID tags that provides confidentiality, untraceability, mutual authentication, and efficiency. The proposed protocol shifts the heavy burden of asymmetric encryption and decryption operations on the more powerful server side and only leaves lightweight hash operation on tag side. It is also efficient in terms of time complexity, space complexity, and communication cost, which are very important for practical large-scale RFID applications.