Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Soft blocking: flexible blocker tags on the cheap
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
IEEE Transactions on Dependable and Secure Computing
RFID authentication protocol for low-cost tags
WiSec '08 Proceedings of the first ACM conference on Wireless network security
A novel mutual authentication scheme based on quadratic residues for RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Computer Standards & Interfaces
Secure RFID authentication scheme for EPC class Gen2
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards
Computer Standards & Interfaces
A Security and Performance Evaluation of Hash-Based RFID Protocols
Information Security and Cryptology
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard
Computer Communications
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Journal of Parallel and Distributed Computing
Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags
IEEE Communications Letters
Engineering Applications of Artificial Intelligence
RFID privacy: relation between two notions, minimal condition, and efficient construction
Proceedings of the 16th ACM conference on Computer and communications security
Analysis of RFID mutual authentication protocols
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Lightweight authentication protocol for mobile RFID networks
International Journal of Security and Networks
A secure and efficient authentication protocol for passive RFID tags
ISWCS'09 Proceedings of the 6th international conference on Symposium on Wireless Communication Systems
A Lightweight Authentication Protocol for Low-Cost RFID
Journal of Signal Processing Systems
A lightweight RFID protocol using substring
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
An efficient mutual authentication protocol on RFID tags
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Securing RFID systems conforming to EPC Class 1 Generation 2 standard
Expert Systems with Applications: An International Journal
A survey on RFID security and provably secure grouping-proof protocols
International Journal of Internet Technology and Secured Transactions
Scalable RFID security protocols supporting tag ownership transfer
Computer Communications
Diffusing RFID-sensor networks and security threats
WSEAS Transactions on Signal Processing
SAPCC1G2: a mutual authentication protocol promote the security of RFID and WSN integration system
International Journal of Communication Networks and Distributed Systems
On two RFID privacy notions and their relations
ACM Transactions on Information and System Security (TISSEC)
An attack on an RFID authentication protocol conforming to EPC class 1 generation 2 standard
ICHIT'11 Proceedings of the 5th international conference on Convergence and hybrid information technology
Privacy-friendly synchronized ultralightweight authentication protocols in the storm
Journal of Network and Computer Applications
Security flaws in a recent RFID delegation protocol
Personal and Ubiquitous Computing
Security threat mitigation trends in low-cost RFID systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
RFID system for public train transportation
Security and Communication Networks
Server-less RFID authentication and searching protocol with enhanced security
International Journal of Communication Systems
Based on mobile RFID for membership stores system conforming EPC C1G2 standards
International Journal of Ad Hoc and Ubiquitous Computing
An Ownership Transfer Scheme Using Mobile RFIDs
Wireless Personal Communications: An International Journal
Design of a secure RFID authentication scheme preceding market transactions
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Unbalanced states violates RFID privacy
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
A Radio Frequency Identification Device (RFID) allows effective identification of a large number of tagged objects without physical or visual contact. RFID systems are a promising technology for supply chain management and inventory control. As individual item tagging becomes a reality, privacy concerns over RFID use come to the fore. The shared radio medium allow eavesdropping and unauthorized tag reading which poses threats to individual's privacy. Moreover, due to the mode of use of RFIDs, new threats emerge. For example, an intruder may be able to track the movement of an individual by repeatedly querying an RFID attached to the item that this individual carries. The limited size and cost considerations do not allow to implement conventional cryptographic systems on RFIDs. In this paper we propose an efficient RFID tag identification algorithm that incorporates reader-authentication. Our algorithm is secure against the anticipated threats to RFID systems. Our algorithm does not require computationally expensive cryptographic mechanisms, it relies on rather simple matrix multiplication. To further enhance the utility of our algorithm we propose a scheme that allows for the algorithm to carry out secure identification of multiple tags simultaneously.