Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
RFID authentication protocol for low-cost tags
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Securing RFID Systems by Detecting Tag Cloning
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
Computer Standards & Interfaces
Engineering Applications of Artificial Intelligence
Effective and Efficient Event Dissemination for RFID Applications
The Computer Journal
Improvement of the edit distance attack to clock-controlled LFSR-Based stream ciphers
EUROCAST'05 Proceedings of the 10th international conference on Computer Aided Systems Theory
Towards provable security for ubiquitous applications
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
This work addresses the critical problem of authentication in RFID. It describes a new lightweight scheme for mutual authentication between readers and tags that fulfills the EPCGen2 standard and all practical requirements of low-cost RFID such as resource limitation of tags and minimal interaction between tags and readers. Furthermore, the proposal does not rely on RFID readers as they are portable, and instead of that, it bases its security on trust in the back-end server because all shared secrets are stored only by the tag and the back-end server, with no possible access by the reader at any time.