RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
The Evolution of RFID Security
IEEE Pervasive Computing
Architecture design and performance evaluation of RFID object tracking systems
Computer Communications
The state of RFID for effective baggage tracking in the airline industry
International Journal of Mobile Communications
RFID in retail: a framework for examining consumers' ethical perceptions
International Journal of Mobile Communications
A Framework for Assessing RFID System Security and Privacy Risks
IEEE Pervasive Computing
Robust and efficient authenticated key agreement in mobile communications
International Journal of Mobile Communications
Defining strong privacy for RFID
ACM Transactions on Information and System Security (TISSEC)
Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags
IEEE Communications Letters
Enhanced monitoring of tuberculosis patients by using RFID technologies
International Journal of Mobile Communications
Understanding the key success factors of RFID use in Supply Chain Management: a Delphi study
International Journal of Mobile Communications
An authentication protocol for low-cost RFID tags
International Journal of Mobile Communications
MARP: mobile agent for RFID privacy protection
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Critical RFID Privacy-Enhancing Technologies
IEEE Security and Privacy
Secure and Serverless RFID Authentication and Search Protocols
IEEE Transactions on Wireless Communications
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
In the past researches, most of the authentication protocols were designed in an effort to solve the RFID security and privacy problem regarding the encrypted communication between the database and readers, and readers and tags. Based on the proposal of Mobile Agent device for RFID privacy Protection (MARP), some security problems have been exposed. Later on, protecting the privacy with a mobile agent device in RFID environment (eMARP) has shown improvement on MARP. The mobile agent device provides more powerful computation than the tag, in addition to the privacy protection along with the forgery detection. However, we found out that the authentication protocol of eMARP could not resist location tracking. Therefore, we will discuss and demonstrate that the eMARP-based RFID system does not have ability to achieve location tracking in this paper. We have improved the authentication protocol of eMARP-based RFID system and also have eliminated its vulnerability.