RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
Radio frequency identification: technologies, applications, and research issues: Research Articles
Wireless Communications & Mobile Computing
IEEE Transactions on Dependable and Secure Computing
RFID authentication protocol for low-cost tags
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Security co-existence of wireless sensor networks and RFID for pervasive computing
Computer Communications
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol
Information Security Applications
Security of RFID Protocols -- A Case Study
Electronic Notes in Theoretical Computer Science (ENTCS)
Lightweight authentication protocol for mobile RFID networks
International Journal of Security and Networks
Automated Security Protocol Analysis With the AVISPA Tool
Electronic Notes in Theoretical Computer Science (ENTCS)
International Journal of Security and Networks
On the security of RFID devices against implementation attacks
International Journal of Security and Networks
Wireless Communications & Mobile Computing
M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
EMAP: an efficient mutual-authentication protocol for low-cost RFID tags
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
On the security of public key protocols
IEEE Transactions on Information Theory
Security and privacy in RFID and applications in telemedicine
IEEE Communications Magazine
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Radio-frequency identification RFID is an RFID tag based technology for providing automated identification of both objects and humans. RFID tags have numerous potential applications if a secured authentication and privacy could be provided. An RFID tag is interrogated by a reader to get the identity of the tag along with other information. A mutual authentication between the tag and reader should take place before revealing tag's identification or any other sensitive information to a reader. Lightweight mutual authentication protocol LMAP is a low-cost authentication protocol for RFID tags, where tags perform only simple bit-wise operations and readers perform high computational operations. In this paper, we have validated the security properties of LMAP by using an automated, security protocol validation tool, named AVISPA. Two attacks on mutual authentication have been reported by AVISPA. We also analyse how these attacks could be extenuated.