A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
A novel mutual authentication scheme based on quadratic residues for RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
An Improvement on RFID Authentication Protocol with Privacy Protection
ICCIT '08 Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology - Volume 02
A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Mutual authentication protocol for RFID tags based on synchronized secret information with monitor
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
RFID mutual authentication protocols
Decision Support Systems
Improvement of the RFID authentication scheme based on quadratic residues
Computer Communications
Design and Optimization of Passive UHF RFID Systems
Design and Optimization of Passive UHF RFID Systems
Expert Systems with Applications: An International Journal
Addressing flaws in RFID authentication protocols
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
Hi-index | 0.00 |
Radio frequency identification (RFID) is a popular kind of automatic identification technologies that uses radio frequencies. Many security and privacy problems my be raised in the using of RFID due to its radio transmission nature. In 2012, Cho et al. (Comput Math Appl, 2012. doi:10.1016/j.camwa.2012.02.025) proposed a new hash-based RFID mutual authentication protocol to solve these problems. However, this protocol was demonstrated to be vulnerable to DOS attack. This paper further shows that Cho et al.'s protocol is vulnerable to traffic analysis and tag/reader impersonation attacks. An improved protocol is also proposed which can prevent the said attacks.